aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorbrooks <brooks@FreeBSD.org>2007-01-06 05:32:19 +0800
committerbrooks <brooks@FreeBSD.org>2007-01-06 05:32:19 +0800
commit07f8fdcf4a87c7fbb969a913c0f76e8f440324c9 (patch)
tree331387ebb5f420eeff8e6d78f12f094f6305f861 /security
parentd63909dedfa7ef12b0de3c13709b4592b6c6e365 (diff)
downloadfreebsd-ports-gnome-07f8fdcf4a87c7fbb969a913c0f76e8f440324c9.tar.gz
freebsd-ports-gnome-07f8fdcf4a87c7fbb969a913c0f76e8f440324c9.tar.zst
freebsd-ports-gnome-07f8fdcf4a87c7fbb969a913c0f76e8f440324c9.zip
Upgrade drupal to 4.7.5 fixing a couple security issues.
Upgrade drupal-pubcookie and drupal-textile to the 4.7 versions. Submitted by: Nick Hilliard <nick at foobar dot org> (upgrade to 4.7.4) Security: vid:3d8d3548-9d02-11db-a541-000ae42e9b93
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c669b6b6aa71..80d226ba2c9a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,47 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3d8d3548-9d02-11db-a541-000ae42e9b93">
+ <topic>drupal -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>drupal</name>
+ <range><gt>4.7</gt><lt>4.7.5</lt></range>
+ <range><lt>4.6.11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Drupal security team reports:</p>
+ <blockquote cite="http://drupal.org/files/sa-2007-001/advisory.txt">
+ <p>A few arguments passed via URLs are not properly sanitized
+ before display. When an attacker is able to entice an
+ administrator to follow a specially crafted link, arbitrary
+ HTML and script code can be injected and executed in the
+ victim's session. Such an attack may lead to administrator
+ access if certain conditions are met.</p>
+ </blockquote>
+ <blockquote cite="http://drupal.org/files/sa-2007-002/advisory.txt">
+ <p>The way page caching was implemented allows a denial of
+ service attack. An attacker has to have the ability to post
+ content on the site. He or she would then be able to poison
+ the page cache, so that it returns cached 404 page not found
+ errors for existing pages.</p>
+ <p>If the page cache is not enabled, your site is not vulnerable.
+ The vulnerability only affects sites running on top of MySQL.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://drupal.org/files/sa-2007-001/advisory.txt</url>
+ <url>http://drupal.org/files/sa-2007-002/advisory.txt</url>
+ </references>
+ <dates>
+ <discovery>2007-01-05</discovery>
+ <entry>2007-01-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9347d82d-9a66-11db-b271-000e35248ad7">
<topic>w3m -- format string vulnerability</topic>
<affects>