From owner-svn-ports-all@freebsd.org Thu Dec 22 03:22:00 2016
Return-Path:
Delivered-To: svn-ports-all@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 85111C895BC;
Thu, 22 Dec 2016 03:22:00 +0000 (UTC)
(envelope-from junovitch@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 5FC49197E;
Thu, 22 Dec 2016 03:22:00 +0000 (UTC)
(envelope-from junovitch@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uBM3Lxw3010577;
Thu, 22 Dec 2016 03:21:59 GMT (envelope-from junovitch@FreeBSD.org)
Received: (from junovitch@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uBM3Lxnv010575;
Thu, 22 Dec 2016 03:21:59 GMT (envelope-from junovitch@FreeBSD.org)
Message-Id: <201612220321.uBM3Lxnv010575@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: junovitch set sender to
junovitch@FreeBSD.org using -f
From: Jason Unovitch
Date: Thu, 22 Dec 2016 03:21:59 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r429139 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-all@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the ports tree
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 22 Dec 2016 03:22:00 -0000
Author: junovitch
Date: Thu Dec 22 03:21:59 2016
New Revision: 429139
URL: https://svnweb.freebsd.org/changeset/ports/429139
Log:
Document Joomla! security advisories since 3.4.6 was released.
While here, update entry for 3.4.6 with final advisory information from
JSST page.
A big thanks to Larry Rosenman for reporting the open issues and getting the
port up to date.
PR: 215058
Reported by: Larry Rosenman
Security: CVE-2016-8869
Security: CVE-2016-8870
Security: CVE-2016-9081
Security: CVE-2016-9836
Security: CVE-2016-9837
Security: CVE-2016-9838
Security: https://vuxml.FreeBSD.org/freebsd/624b45c0-c7f3-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/a27d234a-c7f2-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/c0ef061a-c7f0-11e6-ae1b-002590263bf5.html
Security: https://vuxml.FreeBSD.org/freebsd/f0806cad-c7f1-11e6-ae1b-002590263bf5.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Dec 22 02:15:31 2016 (r429138)
+++ head/security/vuxml/vuln.xml Thu Dec 22 03:21:59 2016 (r429139)
@@ -58,6 +58,175 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
+
+ Joomla! -- multiple vulnerabilities
+
+
+ joomla3
+ 1.6.03.6.5
+
+
+
+
+ The JSST and the Joomla! Security Center report:
+
+ [20161201] - Core - Elevated Privileges
+ Incorrect use of unfiltered data stored to the session on a form
+ validation failure allows for existing user accounts to be modified;
+ to include resetting their username, password, and user group
+ assignments.
+
+
+ [20161202] - Core - Shell Upload
+ Inadequate filesystem checks allowed files with alternative PHP
+ file extensions to be uploaded.
+
+
+ [20161203] - Core - Information Disclosure
+ Inadequate ACL checks in the Beez3 com_content article layout
+ override enables a user to view restricted content.
+
+
+
+
+ CVE-2016-9836
+ CVE-2016-9837
+ CVE-2016-9838
+ https://developer.joomla.org/security-centre/664-20161201-core-elevated-privileges.html
+ https://developer.joomla.org/security-centre/665-20161202-core-shell-upload.html
+ https://developer.joomla.org/security-centre/666-20161203-core-information-disclosure.html
+ https://www.joomla.org/announcements/release-news/5693-joomla-3-6-5-released.html
+
+
+ 2016-12-06
+ 2016-12-22
+
+
+
+
+ Joomla! -- multiple vulnerabilities
+
+
+ joomla3
+ 3.4.43.6.4
+
+
+
+
+ The JSST and the Joomla! Security Center report:
+
+ [20161001] - Core - Account Creation
+ Inadequate checks allows for users to register on a site when
+ registration has been disabled.
+
+
+ [20161002] - Core - Elevated Privilege
+ Incorrect use of unfiltered data allows for users to register on a
+ site with elevated privileges.
+
+
+ [20161003] - Core - Account Modifications
+ Incorrect use of unfiltered data allows for existing user accounts
+ to be modified; to include resetting their username, password, and
+ user group assignments.
+
+
+
+
+ CVE-2016-8869
+ CVE-2016-8870
+ CVE-2016-9081
+ https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html
+ https://developer.joomla.org/security-centre/660-20161002-core-elevated-privileges.html
+ https://developer.joomla.org/security-centre/661-20161003-core-account-modifications.html
+ https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html
+
+
+ 2016-10-25
+ 2016-12-22
+
+
+
+
+ Joomla! -- multiple vulnerabilities
+
+
+ joomla3
+ 1.6.03.6.1
+
+
+
+
+ The JSST and the Joomla! Security Center report:
+
+ [20160801] - Core - ACL Violation
+ Inadequate ACL checks in com_content provide potential read access
+ to data which should be access restricted to users with edit_own
+ level.
+
+
+ [20160802] - Core - XSS Vulnerability
+ Inadequate escaping leads to XSS vulnerability in mail component.
+
+
+
+ [20160803] - Core - CSRF
+ Add additional CSRF hardening in com_joomlaupdate.
+
+
+
+
+ https://developer.joomla.org/security-centre/652-20160801-core-core-acl-violations.html
+ https://developer.joomla.org/security-centre/653-20160802-core-xss-vulnerability.html
+ https://developer.joomla.org/security-centre/654-20160803-core-csrf.html
+ https://www.joomla.org/announcements/release-news/5665-joomla-3-6-1-released.html
+
+
+ 2016-08-03
+ 2016-12-22
+
+
+
+
+ Joomla! -- multiple vulnerabilities
+
+
+ joomla3
+ 1.5.03.4.7
+
+
+
+
+ The JSST and the Joomla! Security Center report:
+
+ [20151206] - Core - Session Hardening
+ The Joomla Security Strike team has been following up on the
+ critical security vulnerability patched last week. Since the recent
+ update it has become clear that the root cause is a bug in PHP
+ itself. This was fixed by PHP in September of 2015 with the releases
+ of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all
+ versions of PHP 7 and has been back-ported in some specific Linux
+ LTS versions of PHP 5.3). This fixes the bug across all supported
+ PHP versions.
+
+
+ [20151207] - Core - SQL Injection
+ Inadequate filtering of request data leads to a SQL Injection
+ vulnerability.
+
+
+
+
+ https://developer.joomla.org/security-centre/639-20151206-core-session-hardening.html
+ https://developer.joomla.org/security-centre/640-20151207-core-sql-injection.html
+ https://www.joomla.org/announcements/release-news/5643-joomla-3-4-7.html
+
+
+ 2015-12-21
+ 2016-12-22
+
+
+
xen-kernel -- x86 PV guests may be able to mask interrupts
@@ -21854,12 +22023,27 @@ and CVE-2013-0155.
- Joomla! reports:
-
- Joomla! 3.4.6 is now available. This is a security release
- for the 3.x series of Joomla which addresses a critical security
- vulnerability and 4 low level security vulnerabilities. We strongly
- recommend that you update your sites immediately.
+ The JSST and the Joomla! Security Center report:
+
+ [20151201] - Core - Remote Code Execution Vulnerability
+ Browser information is not filtered properly while saving the
+ session values into the database which leads to a Remote Code
+ Execution vulnerability.
+
+
+ [20151202] - Core - CSRF Hardening
+ Add additional CSRF hardening in com_templates.
+
+
+ [20151203] - Core - Directory Traversal
+ Failure to properly sanitise input data from the XML install file
+ located within an extension's package archive allows for directory
+ traversal.
+
+
+ [20151204] - Core - Directory Traversal
+ Inadequate filtering of request data leads to a Directory Traversal
+ vulnerability.
@@ -21869,10 +22053,15 @@ and CVE-2013-0155.
CVE-2015-8563
CVE-2015-8564
CVE-2015-8565
+ https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html
+ https://developer.joomla.org/security-centre/633-20151214-core-csrf-hardening.html
+ https://developer.joomla.org/security-centre/634-20151214-core-directory-traversal.html
+ https://developer.joomla.org/security-centre/635-20151214-core-directory-traversal-2.html
2015-12-14
2015-12-17
+ 2016-12-22