aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorzi <zi@FreeBSD.org>2012-07-30 20:42:32 +0800
committerzi <zi@FreeBSD.org>2012-07-30 20:42:32 +0800
commitecd2bc82a13f927295d1f816eb57164827a196e8 (patch)
tree90d21101641bd11b96895136db804b14464e2cac /security
parent3e6c233d12540c71b8ba4fc63f30af8a2513d633 (diff)
downloadfreebsd-ports-gnome-ecd2bc82a13f927295d1f816eb57164827a196e8.tar.gz
freebsd-ports-gnome-ecd2bc82a13f927295d1f816eb57164827a196e8.tar.zst
freebsd-ports-gnome-ecd2bc82a13f927295d1f816eb57164827a196e8.zip
- Update net/isc-dhcp41-server to 4.1-ESV-R6 [1]
- Document vulnerabilities in net/isc-dhcp41-server - Cleanup formatting in vuxml PR: ports/170245 [1] Submitted by: Douglas Thrift <douglas@douglasthrift.net> (maintainer) [1] Security: c7fa3618-d5ff-11e1-90a2-000c299b62e1
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml50
1 files changed, 27 insertions, 23 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 2156c024e6cf..9bbe1f318e33 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -67,28 +67,28 @@ Note: Please add new entries to the beginning of this file.
<h1>A Bugzilla Security Advisory reports:</h1>
<blockquote cite="http://www.bugzilla.org/security/3.6.9/">
<p>The following security issues have been discovered in
- Bugzilla:</p>
+ Bugzilla:</p>
<h1>Information Leak</h1>
<p>Versions: 4.1.1 to 4.2.1, 4.3.1</p>
<p>In HTML bugmails, all bug IDs and attachment IDs are
- linkified, and hovering these links displays a tooltip
- with the bug summary or the attachment description if
- the user is allowed to see the bug or attachment.
- But when validating user permissions when generating the
- email, the permissions of the user who edited the bug were
- taken into account instead of the permissions of the
- addressee. This means that confidential information could
- be disclosed to the addressee if the other user has more
- privileges than the addressee.
- Plain text bugmails are not affected as bug and attachment
- IDs are not linkified.</p>
+ linkified, and hovering these links displays a tooltip
+ with the bug summary or the attachment description if
+ the user is allowed to see the bug or attachment.
+ But when validating user permissions when generating the
+ email, the permissions of the user who edited the bug were
+ taken into account instead of the permissions of the
+ addressee. This means that confidential information could
+ be disclosed to the addressee if the other user has more
+ privileges than the addressee.
+ Plain text bugmails are not affected as bug and attachment
+ IDs are not linkified.</p>
<h1>Information Leak</h1>
- <p>Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to
- 4.2.1, 4.3.1</p>
+ <p>Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to
+ 4.2.1, 4.3.1</p>
<p>The description of a private attachment could be visible
- to a user who hasn't permissions to access this attachment
- if the attachment ID is mentioned in a public comment in
- a bug that the user can see.</p>
+ to a user who hasn't permissions to access this attachment
+ if the attachment ID is mentioned in a public comment in
+ a bug that the user can see.</p>
</blockquote>
</body>
</description>
@@ -176,13 +176,13 @@ Note: Please add new entries to the beginning of this file.
<p>The RT development team reports:</p>
<blockquote cite="http://blog.bestpractical.com/2012/07/security-vulnerabilities-in-three-commonly-deployed-rt-extensions.html">
<p>RT::Authen::ExternalAuth 0.10 and below (for all versions
- of RT) are vulnerable to an escalation of privilege attack
- where the URL of a RSS feed of the user can be used to
- acquire a fully logged-in session as that user.
- CVE-2012-2770 has been assigned to this vulnerability.</p>
+ of RT) are vulnerable to an escalation of privilege attack
+ where the URL of a RSS feed of the user can be used to
+ acquire a fully logged-in session as that user.
+ CVE-2012-2770 has been assigned to this vulnerability.</p>
<p>Users of RT 3.8.2 and above should upgrade to
- RT::Authen::ExternalAuth 0.11, which resolves this
- vulnerability.</p>
+ RT::Authen::ExternalAuth 0.11, which resolves this
+ vulnerability.</p>
</blockquote>
</body>
</description>
@@ -200,6 +200,10 @@ Note: Please add new entries to the beginning of this file.
<topic>isc-dhcp -- multiple vulnerabilities</topic>
<affects>
<package>
+ <name>isc-dhcp41-server</name>
+ <range><lt>4.1.e_5,2</lt></range>
+ </package>
+ <package>
<name>isc-dhcp42-server</name>
<range><lt>4.2.4_1</lt></range>
</package>