diff options
author | junovitch <junovitch@FreeBSD.org> | 2015-10-10 23:01:54 +0800 |
---|---|---|
committer | junovitch <junovitch@FreeBSD.org> | 2015-10-10 23:01:54 +0800 |
commit | 82d5728e5844b85aaecef2b45a432f0068058975 (patch) | |
tree | ed4f4c21403d4abefe7ea606ce482198dcb061df /security | |
parent | 7ec5dcaea0022333debd04793982bb9f22a5249e (diff) | |
download | freebsd-ports-gnome-82d5728e5844b85aaecef2b45a432f0068058975.tar.gz freebsd-ports-gnome-82d5728e5844b85aaecef2b45a432f0068058975.tar.zst freebsd-ports-gnome-82d5728e5844b85aaecef2b45a432f0068058975.zip |
Document iPython vulnerabilities fixed in 3.2.2
PR: 203668
Security: CVE-2015-6938
Security: CVE-2015-7337
Security: https://vuxml.FreeBSD.org/freebsd/290351c9-6f5c-11e5-a2a1-002590263bf5.html
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5b7f15844f6c..ac9a03c64594 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,53 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="290351c9-6f5c-11e5-a2a1-002590263bf5"> + <topic>devel/ipython -- multiple vulnerabilities</topic> + <affects> + <package> + <name>ipython</name> + <range><lt>3.2.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matthias Bussonnier reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/02/3"> + <p>Summary: Local folder name was used in HTML templates without + escaping, allowing XSS in said pages by carefully crafting folder + name and URL to access it.</p> + <p>URI with issues:</p> + <ul> + <li>GET /tree/**</li> + </ul> + </blockquote> + <p>Benjamin RK reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/16/3"> + <p>Vulnerability: A maliciously forged file opened for editing can + execute javascript, specifically by being redirected to /files/ due + to a failure to treat the file as plain text.</p> + <p>URI with issues:</p> + <ul> + <li>GET /edit/**</li> + </ul> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/203668</freebsdpr> + <cvename>CVE-2015-6938</cvename> + <cvename>CVE-2015-7337</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/02/3</url> + <url>https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892</url> + <url>http://www.openwall.com/lists/oss-security/2015/09/16/3</url> + <url>https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967</url> + </references> + <dates> + <discovery>2015-09-01</discovery> + <entry>2015-10-10</entry> + </dates> + </vuln> + <vuln vid="a0182578-6e00-11e5-a90c-0026551a22dc"> <topic>PostgreSQL -- minor security problems.</topic> <affects> |