Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Feb 2014 11:31:36 +0100
From:      Remko Lodder <remko@FreeBSD.org>
To:        Carlo Strub <cs@FreeBSD.org>
Cc:        svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r343150 - head/security/vuxml
Message-ID:  <5E777029-D0FC-42D7-A68A-88135C478766@FreeBSD.org>
In-Reply-To: <201402062039.s16KdVOF016819@svn.freebsd.org>
References:  <201402062039.s16KdVOF016819@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_6933EADE-0428-452A-ACBB-83F23A81A657
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On 06 Feb 2014, at 21:39, Carlo Strub <cs@FreeBSD.org> wrote:

> Author: cs
> Date: Thu Feb  6 20:39:30 2014
> New Revision: 343150
> URL: http://svnweb.freebsd.org/changeset/ports/343150
> QAT: https://qat.redports.org/buildarchive/r343150/
>=20
> Log:
>  Update VUXML entry on recent otrs vulnerabilities
>=20
>  Suggested by:	remko@

thank you!

>=20
> Modified:
>  head/security/vuxml/vuln.xml
>=20
> Modified: head/security/vuxml/vuln.xml
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> --- head/security/vuxml/vuln.xml	Thu Feb  6 20:34:55 2014	=
(r343149)
> +++ head/security/vuxml/vuln.xml	Thu Feb  6 20:39:30 2014	=
(r343150)
> @@ -249,11 +249,13 @@ Note:  Please add new entries to the beg
>   </vuln>
>=20
>   <vuln vid=3D"c7b5d72b-886a-11e3-9533-60a44c524f57">
> -    <topic>otrs -- SQL injection issue</topic>
> +    <topic>otrs -- multiple vulnerabilities</topic>
>     <affects>
>       <package>
> 	<name>otrs</name>
> -	<range><lt>3.2.14</lt></range>
> +	<range><lt>3.1.19</lt></range>
> +	<range><gt>3.2.*</gt><lt>3.2.14</lt></range>
> +	<range><gt>3.3.*</gt><lt>3.3.4</lt></range>
>       </package>
>     </affects>
>     <description>
> @@ -262,29 +264,6 @@ Note:  Please add new entries to the beg
> 	<blockquote =
cite=3D"https://www.otrs.com/security-advisory-2014-02-sql-injection-issue=
/">
> 	  <p>SQL injection issue</p>
> 	</blockquote>
> -      </body>
> -    </description>
> -    <references>
> -      <cvename>CVE-2014-1471</cvename>
> -      =
<url>https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/</=
url>
> -    </references>
> -    <dates>
> -      <discovery>2014-01-28</discovery>
> -      <entry>2014-01-28</entry>
> -    </dates>
> -  </vuln>
> -
> -  <vuln vid=3D"080c5370-886a-11e3-9533-60a44c524f57">
> -    <topic>otrs -- CSRF issue in customer web interface</topic>
> -    <affects>
> -      <package>
> -	<name>otrs</name>
> -	<range><lt>3.2.14</lt></range>
> -      </package>
> -    </affects>
> -    <description>
> -      <body xmlns=3D"http://www.w3.org/1999/xhtml">;
> -	<p>The OTRS Project reports:</p>
> 	<blockquote =
cite=3D"https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer=
-web-interface/">
> 	  <p>An attacker that managed to take over the session of a =
logged in customer
> 	    could create tickets and/or send follow-ups to existing =
tickets due to
> @@ -293,14 +272,21 @@ Note:  Please add new entries to the beg
>       </body>
>     </description>
>     <references>
> +      <cvename>CVE-2014-1471</cvename>
> +      =
<url>https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/</=
url>
>       =
<url>https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-we=
b-interface/</url>
>     </references>
>     <dates>
>       <discovery>2014-01-28</discovery>
>       <entry>2014-01-28</entry>
> +      <modified>2014-02-06</modified>
>     </dates>
>   </vuln>
>=20
> +  <vuln vid=3D"080c5370-886a-11e3-9533-60a44c524f57">
> +    <cancelled superseded=3D"c7b5d72b-886a-11e3-9533-60a44c524f57"/>
> +  </vuln>
> +
>   <vuln vid=3D"f9810c43-87a5-11e3-9214-00262d5ed8ee">
>     <topic>chromium -- multiple vulnerabilities</topic>
>     <affects>
> _______________________________________________
> svn-ports-all@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to =
"svn-ports-all-unsubscribe@freebsd.org"

--=20

/"\   Best regards,                      | remko@FreeBSD.org
\ /   Remko Lodder                       | remko@EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News


--Apple-Mail=_6933EADE-0428-452A-ACBB-83F23A81A657
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJS9LYIAAoJEKjD27JZ84ywCckP/jMGSWYWF1RX2fpACDwb1a/w
i33yZfiUAW8lapLC+rz8g0i2BqciDRvn9JCEln9UTvhjo/mkWGr86mKME7QpAmnV
FibX6uYw9XwpyZa9sMrOleLfZX4HhFELHry47EpIwmaiujHH9k47bfcuFrQ1ZCXH
3MUDUaUK9CqT/19u1GtDaS2gNYKPkgWWmcrmKphEwMJiCGbl/1yxH9/NgGQnSoCO
o4nd3fc2RXvwOUPXYahs9auIbMWmYhlCRgCHAgkDnb+EXmJaWBp0+NRQr3Lpy9ue
XEWb5RKc+iumI9jUw3roX8/XF7kGKMXxvAUoILfHCAubXH+yPv8YIJguspkEtO2i
lMvWv+EGee5p8V2jaa1q21qmdZAjBsF7dI7YF96I5sgIh9Tugrkf4wd2ZadyezWS
rFT/kh+bCinhu2h1ZBSJj9i4M5j20AMo/XNtcLYOD4AhHeRy6YgWAOBNtCttZDP4
T4P0qrAhcK4kNa5Zoiw71zeV4+fMYISi7zeS6YXT7pZG447Sit6glgiqjxfNHkWK
n0yFm08zF/8j2Kryzc93F3xWPCEIO9XQHSjsIjvv6/Ii9PYen57IHSPfhQCv1xxl
638VslC4zxDHDDPKtLivEE6pkY+grijM1YmChUPKLvitfuAkQ3ZrfZfwUz5RVOfQ
nRIZ8Ws5ptpn8UCIi7+g
=j+MX
-----END PGP SIGNATURE-----

--Apple-Mail=_6933EADE-0428-452A-ACBB-83F23A81A657--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5E777029-D0FC-42D7-A68A-88135C478766>