From owner-freebsd-ports-bugs@FreeBSD.ORG Fri Jul 17 08:30:07 2009 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 53C67106564A for ; Fri, 17 Jul 2009 08:30:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 17FEB8FC14 for ; Fri, 17 Jul 2009 08:30:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n6H8U6kT032569 for ; Fri, 17 Jul 2009 08:30:06 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n6H8U6De032563; Fri, 17 Jul 2009 08:30:06 GMT (envelope-from gnats) Resent-Date: Fri, 17 Jul 2009 08:30:06 GMT Resent-Message-Id: <200907170830.n6H8U6De032563@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Romain Tartiere Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BF7B3106566B; Fri, 17 Jul 2009 08:25:30 +0000 (UTC) (envelope-from romain@blogreen.org) Received: from marvin.blogreen.org (unknown [IPv6:2a01:e35:2f7d:58c0:0:2:1:2]) by mx1.freebsd.org (Postfix) with ESMTP id 45E6A8FC17; Fri, 17 Jul 2009 08:25:30 +0000 (UTC) (envelope-from romain@blogreen.org) Received: by marvin.blogreen.org (Postfix, from userid 1001) id 48FFE5CB33; Fri, 17 Jul 2009 10:25:29 +0200 (CEST) Message-Id: <20090717082529.48FFE5CB33@marvin.blogreen.org> Date: Fri, 17 Jul 2009 10:25:29 +0200 (CEST) From: Romain Tartiere To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: security-team@FreeBSD.org, maintainer@FreeBSD.org Subject: ports/136859: vuxml update for security vulnerability: ports:mono X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Romain Tartiere List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Jul 2009 08:30:07 -0000 >Number: 136859 >Category: ports >Synopsis: vuxml update for security vulnerability: ports:mono >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Fri Jul 17 08:30:06 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Romain Tartiere >Release: FreeBSD 7.2-STABLE i386 >Organization: >Environment: System: FreeBSD marvin.blogreen.org 7.2-STABLE FreeBSD 7.2-STABLE #5 r194822M: Wed Jun 24 14:10:46 CEST 2009 root@marvin.blogreen.org:/usr/obj/usr/src/sys/MARVIN i386 >Description: >How-To-Repeat: >Fix: --- vuln.xml.patch1 begins here --- --- vuln.xml.orig 2009-07-17 10:18:36.000000000 +0200 +++ vuln.xml 2009-07-17 10:08:33.000000000 +0200 @@ -34,6 +34,32 @@ --> + + mono -- XML signature HMAC truncation authentication bypass + + + mono + 2.4.2.2 + + + + +

US-CERT reports:

+
+

The XML Signature specification allows for HMAC truncation, which + may allow a remote attacker to bypass authentication.

+
+ +
+ + CVE-2009-0217 + + + 2009-07-14 + 2009-07-17 + +
+ nfsen -- remote command execution --- vuln.xml.patch1 ends here --- >Release-Note: >Audit-Trail: >Unformatted: