From owner-svn-ports-head@FreeBSD.ORG Sat Mar 2 20:07:42 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 67FE79AE; Sat, 2 Mar 2013 20:07:42 +0000 (UTC) (envelope-from ohauer@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 596BEFE6; Sat, 2 Mar 2013 20:07:42 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.5/8.14.5) with ESMTP id r22K7gq0024135; Sat, 2 Mar 2013 20:07:42 GMT (envelope-from ohauer@svn.freebsd.org) Received: (from ohauer@localhost) by svn.freebsd.org (8.14.5/8.14.5/Submit) id r22K7gFQ024134; Sat, 2 Mar 2013 20:07:42 GMT (envelope-from ohauer@svn.freebsd.org) Message-Id: <201303022007.r22K7gFQ024134@svn.freebsd.org> From: Olli Hauer Date: Sat, 2 Mar 2013 20:07:42 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r313292 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 02 Mar 2013 20:07:42 -0000 Author: ohauer Date: Sat Mar 2 20:07:41 2013 New Revision: 313292 URL: http://svnweb.freebsd.org/changeset/ports/313292 Log: - document apache22 issues - tim trailing tabs Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Mar 2 20:05:21 2013 (r313291) +++ head/security/vuxml/vuln.xml Sat Mar 2 20:07:41 2013 (r313292) @@ -51,6 +51,52 @@ Note: Please add new entries to the beg --> + + apache22 -- several vulnerabilities + + + apache22 + 2.2.02.2.24 + + + apache22-event-mpm + 2.2.02.2.24 + + + apache22-itk-mpm + 2.2.02.2.24 + + + apache22-peruser-mpm + 2.2.02.2.24 + + + apache22-worker-mpm + 2.2.02.2.24 + + + + +

Apache HTTP SERVER PROJECT reports:

+
+

low: XSS due to unescaped hostnames CVE-2012-3499

+

Various XSS flaws due to unescaped hostnames and URIs HTML output in + mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

+

moderate: XSS in mod_proxy_balancer CVE-2012-4558

+

A XSS flaw affected the mod_proxy_balancer manager interface.

+
+ +
+ + CVE-2012-3499 + CVE-2012-4558 + + + 2012-10-07 + 2013-03-02 + +
+ sudo -- Authentication bypass when clock is reset @@ -468,27 +514,27 @@ Note: Please add new entries to the beg - CVE-2013-0879 - CVE-2013-0880 - CVE-2013-0881 - CVE-2013-0882 - CVE-2013-0883 - CVE-2013-0884 - CVE-2013-0885 - CVE-2013-0887 - CVE-2013-0888 - CVE-2013-0889 - CVE-2013-0890 - CVE-2013-0891 - CVE-2013-0892 - CVE-2013-0893 - CVE-2013-0894 - CVE-2013-0895 - CVE-2013-0896 - CVE-2013-0897 - CVE-2013-0898 - CVE-2013-0899 - CVE-2013-0900 + CVE-2013-0879 + CVE-2013-0880 + CVE-2013-0881 + CVE-2013-0882 + CVE-2013-0883 + CVE-2013-0884 + CVE-2013-0885 + CVE-2013-0887 + CVE-2013-0888 + CVE-2013-0889 + CVE-2013-0890 + CVE-2013-0891 + CVE-2013-0892 + CVE-2013-0893 + CVE-2013-0894 + CVE-2013-0895 + CVE-2013-0896 + CVE-2013-0897 + CVE-2013-0898 + CVE-2013-0899 + CVE-2013-0900 http://googlechromereleases.blogspot.nl/search/label/Stable%20updates