From owner-svn-ports-head@FreeBSD.ORG Fri Dec 6 00:38:50 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E272ED69; Fri, 6 Dec 2013 00:38:50 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id B481F1877; Fri, 6 Dec 2013 00:38:50 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id rB60coUG055828; Fri, 6 Dec 2013 00:38:50 GMT (envelope-from delphij@svn.freebsd.org) Received: (from delphij@localhost) by svn.freebsd.org (8.14.7/8.14.7/Submit) id rB60coL2055822; Fri, 6 Dec 2013 00:38:50 GMT (envelope-from delphij@svn.freebsd.org) Message-Id: <201312060038.rB60coL2055822@svn.freebsd.org> From: Xin LI Date: Fri, 6 Dec 2013 00:38:50 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r335721 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 Dec 2013 00:38:51 -0000 Author: delphij Date: Fri Dec 6 00:38:50 2013 New Revision: 335721 URL: http://svnweb.freebsd.org/changeset/ports/335721 Log: Document drupal multiple vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Dec 5 23:06:10 2013 (r335720) +++ head/security/vuxml/vuln.xml Fri Dec 6 00:38:50 2013 (r335721) @@ -51,6 +51,50 @@ Note: Please add new entries to the beg --> + + drupal -- multiple vulnerabilities + + + drupal6 + 6.29 + + + drupal7 + 7.24 + + + + +

Drupal Security Team reports:

+
+

Multiple vulnerabilities were fixed in the supported Drupal + core versions 6 and 7.

+
    +
  • Multiple vulnerabilities due to optimistic cross-site + request forgery protection (Form API validation - Drupal 6 + and 7)
  • +
  • Multiple vulnerabilities due to weakness in pseudorandom + number generation using mt_rand() (Form API, OpenID and + random password generation - Drupal 6 and 7)
  • +
  • Code execution prevention (Files directory .htaccess for + Apache - Drupal 6 and 7)
  • +
  • Access bypass (Security token validation - Drupal 6 and 7)
  • +
  • Cross-site scripting (Image module - Drupal 7)
  • +
  • Cross-site scripting (Color module - Drupal 7)
  • +
  • Open redirect (Overlay module - Drupal 7)
  • +
+
+ +
+ + https://drupal.org/SA-CORE-2013-003 + + + 2013-11-20 + 2013-12-06 + +
+ chromium -- multiple vulnerabilities