aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorrakuco <rakuco@FreeBSD.org>2011-10-24 00:16:47 +0800
committerrakuco <rakuco@FreeBSD.org>2011-10-24 00:16:47 +0800
commit9789de37e0ea3830dca9ab93c34e540afd6278be (patch)
tree9811d5bf095071217a8d50b0238e385c713dcc15
parent49b2a3500218c1af02317ac9a362f522d9b10e09 (diff)
downloadfreebsd-ports-gnome-9789de37e0ea3830dca9ab93c34e540afd6278be.tar.gz
freebsd-ports-gnome-9789de37e0ea3830dca9ab93c34e540afd6278be.tar.zst
freebsd-ports-gnome-9789de37e0ea3830dca9ab93c34e540afd6278be.zip
Document CVE-2011-3365 and CVE-2011-3366.
Different CVE numbers for different software, but they share the same KDE security advisory. Approved by: makc (mentor)
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index aa31423099ad..e394c2fc9ff2 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,46 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6d21a287-fce0-11e0-a828-00235a5f2c9a">
+ <topic>kdelibs4, rekonq -- input validation failure</topic>
+ <affects>
+ <package>
+ <name>kdelibs</name>
+ <range><ge>4.0.*</ge><lt>4.7.2</lt></range>
+ </package>
+ <package>
+ <name>rekonq</name>
+ <range><lt>0.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>KDE Security Advisory reports:</p>
+ <blockquote cite="http://www.kde.org/info/security/advisory-20111003-1.txt">
+ <p>The default rendering type for a QLabel is QLabel::AutoText, which
+ uses heuristics to determine whether to render the given content as
+ plain text or rich text. KSSL and Rekonq did not properly force its
+ QLabels to use QLabel::PlainText. As a result, if given a certificate
+ containing rich text in its fields, they would render the rich
+ text. Specifically, a certificate containing a common name (CN) that
+ has a table element will cause the second line of the table to be
+ displayed. This can allow spoofing of the certificate's common
+ name.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.kde.org/info/security/advisory-20111003-1.txt</url>
+ <url>http://www.nth-dimension.org.uk/pub/NDSA20111003.txt.asc</url>
+ <cvename>CVE-2011-3365</cvename>
+ <cvename>CVE-2011-3366</cvename>
+ </references>
+ <dates>
+ <discovery>2011-10-03</discovery>
+ <entry>2011-10-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="411ecb79-f9bc-11e0-a7e6-6c626dd55a41">
<topic>piwik -- unknown critical vulnerabilities</topic>
<affects>