Date: Thu, 11 Jul 2013 20:17:34 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322795 - head/security/vuxml Message-ID: <201307112017.r6BKHY0U006589@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Thu Jul 11 20:17:33 2013 New Revision: 322795 URL: http://svnweb.freebsd.org/changeset/ports/322795 Log: - Document ruby vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 11 20:07:33 2013 (r322794) +++ head/security/vuxml/vuln.xml Thu Jul 11 20:17:33 2013 (r322795) @@ -51,6 +51,35 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ebd877b9-7ef4-4375-b1fd-c67780581898"> + <topic>ruby -- Hostname check bypassing vulnerability in SSL client</topic> + <affects> + <package> + <name>ruby19</name> + <range><lt>1.9.3.448,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Ruby Developers report:</p> + <blockquote cite="http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/"> + <p>Ruby's SSL client implements hostname identity check but it does + not properly handle hostnames in the certificate that contain null + bytes. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4073</cvename> + <url>http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/</url> + </references> + <dates> + <discovery>2013-06-27</discovery> + <entry>2013-07-11</entry> + </dates> + </vuln> + <vuln vid="e3e788aa-e9fd-11e2-a96e-60a44c524f57"> <topic>otrs -- Sql Injection + Xss Issue</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307112017.r6BKHY0U006589>