From owner-svn-ports-head@FreeBSD.ORG Mon Jan 27 22:46:39 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 52F4B9EC;
Mon, 27 Jan 2014 22:46:39 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 247481940;
Mon, 27 Jan 2014 22:46:39 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id s0RMkd32043616;
Mon, 27 Jan 2014 22:46:39 GMT (envelope-from matthew@svn.freebsd.org)
Received: (from matthew@localhost)
by svn.freebsd.org (8.14.7/8.14.7/Submit) id s0RMkcXA043615;
Mon, 27 Jan 2014 22:46:38 GMT (envelope-from matthew@svn.freebsd.org)
Message-Id: <201401272246.s0RMkcXA043615@svn.freebsd.org>
From: Matthew Seaman
Date: Mon, 27 Jan 2014 22:46:38 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r341466 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 27 Jan 2014 22:46:39 -0000
Author: matthew
Date: Mon Jan 27 22:46:38 2014
New Revision: 341466
URL: http://svnweb.freebsd.org/changeset/ports/341466
QAT: https://qat.redports.org/buildarchive/r341466/
Log:
Formatting fixes
Submitted by: remko
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Jan 27 22:19:40 2014 (r341465)
+++ head/security/vuxml/vuln.xml Mon Jan 27 22:46:38 2014 (r341466)
@@ -68,26 +68,26 @@ Note: Please add new entries to the beg
The RT development team reports:
Versions of RT between 4.2.0 and 4.2.2 (inclusive) are
- vulnerable to a denial-of-service attack via the email
- gateway; any installation which accepts mail from untrusted
- sources is vulnerable, regardless of the permissions
- configuration inside RT. This vulnerability is assigned
- CVE-2014-1474.
+ vulnerable to a denial-of-service attack via the email
+ gateway; any installation which accepts mail from untrusted
+ sources is vulnerable, regardless of the permissions
+ configuration inside RT. This vulnerability is assigned
+ CVE-2014-1474.
This vulnerability is caused by poor parsing performance
- in the Email::Address::List module, which RT depends on. We
- recommend that affected users upgrade their version of
- Email::Address::List to v0.02 or above, which resolves the
- issue. Due to a communications mishap, the release on CPAN
- will temporarily appear as "unauthorized," and the
- command-line cpan client will hence not install it. We
- expect this to be resolved shortly; in the meantime, the
- release is also available from our server.
+ in the Email::Address::List module, which RT depends on. We
+ recommend that affected users upgrade their version of
+ Email::Address::List to v0.02 or above, which resolves the
+ issue. Due to a communications mishap, the release on CPAN
+ will temporarily appear as "unauthorized," and the
+ command-line cpan client will hence not install it. We
+ expect this to be resolved shortly; in the meantime, the
+ release is also available from our server.