aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorohauer <ohauer@FreeBSD.org>2012-11-28 04:09:34 +0800
committerohauer <ohauer@FreeBSD.org>2012-11-28 04:09:34 +0800
commitaa2e9c5c0f2bde4a951e87ab3c58db77ce2495e3 (patch)
tree9f8dfb171e0e1cd0c69d59bb6b157e4022b468fa
parentaeea63821f40ea3614ef780c12775e12ac15ebc5 (diff)
downloadfreebsd-ports-gnome-aa2e9c5c0f2bde4a951e87ab3c58db77ce2495e3.tar.gz
freebsd-ports-gnome-aa2e9c5c0f2bde4a951e87ab3c58db77ce2495e3.tar.zst
freebsd-ports-gnome-aa2e9c5c0f2bde4a951e87ab3c58db77ce2495e3.zip
- document www/yahoo-ui security issue and mark port forbidden [1]
pet portlint (maintainer is already notified) - adjust CVE entries for bugzilla (CVE-2012-5475 was rejected) [2] Feature safe: yes Security: CVE-2012-5881 [1][2] CVE-2012-5882 [1][2] CVE-2012-5883 [2] Approved by: glarkin (implicit) [1]
-rw-r--r--security/vuxml/vuln.xml39
-rw-r--r--www/yahoo-ui/Makefile6
2 files changed, 42 insertions, 3 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 126277e16a19..cff07e9c3461 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="aa4f86af-3172-11e2-ad21-20cf30e32f6d">
+ <topic>YUI JavaScript library -- JavaScript injection exploits in Flash components</topic>
+ <affects>
+ <package>
+ <name>yahoo-ui</name>
+ <range><lt>3.0.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The YUI team reports:</p>
+ <blockquote cite="http://yuilibrary.com/support/20121030-vulnerability/">
+ <h1>Vulnerability in YUI 2.4.0 through YUI 2.9.0</h1>
+ <p>A XSS vulnerability has been discovered in some YUI 2 .swf files
+ from versions 2.4.0 through 2.9.0. This defect allows JavaScript
+ injection exploits to be created against domains that host affected
+ YUI .swf files.</p>
+ <p>If your site loads YUI 2 from a CDN (yui.yahooapis.com,
+ ajax.googleapis.com, etc.) and not from your own domain, you
+ are not affected. YUI 3 is not affected by this issue.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-5881</cvename>
+ <cvename>CVE-2012-5882</cvename>
+ <url>http://yuilibrary.com/support/20121030-vulnerability/</url>
+ </references>
+ <dates>
+ <discovery>2012-10-30</discovery>
+ <entry>2012-12-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4d64fc61-3878-11e2-a4eb-00262d5ed8ee">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>
@@ -450,13 +484,16 @@ Note: Please add new entries to the beginning of this file.
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=802204</url>
<cvename>CVE-2012-4189</cvename>
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=790296</url>
- <cvename>CVE-2012-5475</cvename>
+ <cvename>CVE-2012-5881</cvename>
+ <cvename>CVE-2012-5882</cvename>
+ <cvename>CVE-2012-5883</cvename>
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=808845</url>
<url>http://yuilibrary.com/support/20121030-vulnerability/</url>
</references>
<dates>
<discovery>2012-11-13</discovery>
<entry>2012-11-14</entry>
+ <modified>2012-11-27</modified>
</dates>
</vuln>
diff --git a/www/yahoo-ui/Makefile b/www/yahoo-ui/Makefile
index 21c71634301b..17c363066f0c 100644
--- a/www/yahoo-ui/Makefile
+++ b/www/yahoo-ui/Makefile
@@ -10,13 +10,15 @@ DISTNAME= yui_${PORTVERSION}r1
MAINTAINER= glarkin@FreeBSD.org
COMMENT= The Yahoo! User Interface (YUI) Library
+LICENSE= BSD
+
+FORBIDDEN= CVE-2012-5881 Cross-site scripting (XSS) vulnerability in the Flash component infrastructure
+
USE_ZIP= yes
WRKSRC= ${WRKDIR}/yui
NO_BUILD= yes
-LICENSE= BSD
-
OPTIONS= APACHE "Configure for Apache-2.x" off \
MINIMAL "Do not install documentation and examples" off