Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 29 Jan 2023 11:36:35 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 269221] security/vuxml: document CVE-2017-11610 and CVE-2019-12105 for outdated versions of sysutils/py-supervisor
Message-ID:  <bug-269221-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D269221

            Bug ID: 269221
           Summary: security/vuxml: document CVE-2017-11610 and
                    CVE-2019-12105 for outdated versions of
                    sysutils/py-supervisor
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: grahamperrin@freebsd.org
                CC: ports-secteam@FreeBSD.org, thomas@gibfest.dk
                CC: ports-secteam@FreeBSD.org, thomas@gibfest.dk

CVE-2019-12105 alone might be negligible (not worth a VuXML entry).=20

<https://github.com/advisories/GHSA-6x94-2xr2-xgw3>;
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=3D2019-12105>;


CVE-2017-11610 is more significant. If there'll be an entry for this one, t=
hen
there may as well be an entry for both.=20

<https://github.com/advisories/GHSA-x7c8-4x3h-874w>;
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=3D2017-11610>;

> The XML-RPC server in supervisor before 3.0.1,=20
> 3.1.x before 3.1.4,=20
> 3.2.x before 3.2.4, and=20
> 3.3.x before 3.3.3 allows remote authenticated users to execute=20
> arbitrary commands via a crafted XML-RPC request, related to=20
> nested supervisord namespace lookups.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-269221-7788>