From owner-svn-ports-all@FreeBSD.ORG Thu Jul 11 20:17:34 2013 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 797B988C; Thu, 11 Jul 2013 20:17:34 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 6A7C6126C; Thu, 11 Jul 2013 20:17:34 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6BKHYRt006591; Thu, 11 Jul 2013 20:17:34 GMT (envelope-from swills@svn.freebsd.org) Received: (from swills@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6BKHY0U006589; Thu, 11 Jul 2013 20:17:34 GMT (envelope-from swills@svn.freebsd.org) Message-Id: <201307112017.r6BKHY0U006589@svn.freebsd.org> From: Steve Wills Date: Thu, 11 Jul 2013 20:17:34 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322795 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Jul 2013 20:17:34 -0000 Author: swills Date: Thu Jul 11 20:17:33 2013 New Revision: 322795 URL: http://svnweb.freebsd.org/changeset/ports/322795 Log: - Document ruby vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 11 20:07:33 2013 (r322794) +++ head/security/vuxml/vuln.xml Thu Jul 11 20:17:33 2013 (r322795) @@ -51,6 +51,35 @@ Note: Please add new entries to the beg --> + + ruby -- Hostname check bypassing vulnerability in SSL client + + + ruby19 + 1.9.3.448,1 + + + + +

Ruby Developers report:

+
+

Ruby's SSL client implements hostname identity check but it does + not properly handle hostnames in the certificate that contain null + bytes. +

+
+ +
+ + CVE-2013-4073 + http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ + + + 2013-06-27 + 2013-07-11 + +
+ otrs -- Sql Injection + Xss Issue