Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 23 Oct 2025 15:33:18 GMT
From:      Fernando =?utf-8?Q?Apestegu=C3=ADa?= <fernape@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 57818171650b - main - security/vuxml: Add rt44, rt50 and rt60 vulnerabilities
Message-ID:  <202510231533.59NFXIJk019429@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=57818171650b0186170f4c7e2f2903b6aba76b23

commit 57818171650b0186170f4c7e2f2903b6aba76b23
Author:     Einar Bjarni Halldórsson <einar@isnic.is>
AuthorDate: 2025-10-23 14:58:06 +0000
Commit:     Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2025-10-23 15:33:05 +0000

    security/vuxml: Add rt44, rt50 and rt60 vulnerabilities
    
     * CVE-2025-9158
     * CVE-2025-61873
    
    PR:             290436
    Report by:      Einar Bjarni Halldórsson <einar@isnic.is>
---
 security/vuxml/vuln/2025.xml | 63 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 63 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 19b04e164747..bc28d678e584 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,66 @@
+  <vuln vid="269c2de7-afaa-11f0-b4c8-792b26d8a051">
+    <topic>RT -- XSS via calendar invitations</topic>
+    <affects>
+      <package>
+       <name>rt60</name>
+       <name>rt50</name>
+       <range><ge>6.0.0</ge><lt>6.0.2</lt></range>
+       <range><ge>5.0.4</ge><lt>5.0.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+      <p>Mateusz Szymaniec and CERT Polska Reports:</p>
+      <blockquote cite="https://github.com/bestpractical/rt/releases/tag/rt-6.0.2">;
+       <p>RT is vulnerable to XSS via calendar invitations added to a
+       ticket. Thanks to Mateusz Szymaniec and CERT Polska for
+       reporting this finding.</p>
+      </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2025-9158</cvename>
+      <url>https://github.com/bestpractical/rt/releases/tag/rt-6.0.2</url>;
+    </references>
+    <dates>
+      <discovery>2025-10-23</discovery>
+      <entry>2025-10-23</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="b374df95-afa8-11f0-b4c8-792b26d8a051">
+    <topic>RT -- CSV injection</topic>
+    <affects>
+      <package>
+       <name>rt60</name>
+       <name>rt50</name>
+       <name>rt44</name>
+       <range><ge>6.0.0</ge><lt>6.0.2</lt></range>
+       <range><ge>5.0.0</ge><lt>5.0.9</lt></range>
+       <range><ge>4.4.0</ge><lt>4.4.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+      <p>Gareth Watkin-Jones from 4armed reports:</p>
+      <blockquote cite="https://github.com/bestpractical/rt/releases/tag/rt-6.0.2">;
+       <p>RT is vulnerable to CSV injection via ticket values with
+       special characters that are exported to a TSV from search
+       results. Thanks to Gareth Watkin-Jones from 4armed for
+       reporting this finding.</p>
+      </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2025-61873</cvename>
+      <url>https://github.com/bestpractical/rt/releases/tag/rt-6.0.2</url>;
+    </references>
+    <dates>
+      <discovery>2025-10-23</discovery>
+      <entry>2025-10-23</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="114cc98b-afad-11f0-af12-bc241121aa0a">
     <topic>FreeBSD -- SO_REUSEPORT_LB breaks connect(2) for UDP sockets</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202510231533.59NFXIJk019429>