Date: Sat, 10 Oct 2015 15:01:55 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r399002 - head/security/vuxml Message-ID: <201510101501.t9AF1tbE032103@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Sat Oct 10 15:01:54 2015 New Revision: 399002 URL: https://svnweb.freebsd.org/changeset/ports/399002 Log: Document iPython vulnerabilities fixed in 3.2.2 PR: 203668 Security: CVE-2015-6938 Security: CVE-2015-7337 Security: https://vuxml.FreeBSD.org/freebsd/290351c9-6f5c-11e5-a2a1-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Oct 10 14:49:28 2015 (r399001) +++ head/security/vuxml/vuln.xml Sat Oct 10 15:01:54 2015 (r399002) @@ -58,6 +58,53 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="290351c9-6f5c-11e5-a2a1-002590263bf5"> + <topic>devel/ipython -- multiple vulnerabilities</topic> + <affects> + <package> + <name>ipython</name> + <range><lt>3.2.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Matthias Bussonnier reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/02/3"> + <p>Summary: Local folder name was used in HTML templates without + escaping, allowing XSS in said pages by carefully crafting folder + name and URL to access it.</p> + <p>URI with issues:</p> + <ul> + <li>GET /tree/**</li> + </ul> + </blockquote> + <p>Benjamin RK reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/16/3"> + <p>Vulnerability: A maliciously forged file opened for editing can + execute javascript, specifically by being redirected to /files/ due + to a failure to treat the file as plain text.</p> + <p>URI with issues:</p> + <ul> + <li>GET /edit/**</li> + </ul> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/203668</freebsdpr> + <cvename>CVE-2015-6938</cvename> + <cvename>CVE-2015-7337</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/02/3</url> + <url>https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892</url> + <url>http://www.openwall.com/lists/oss-security/2015/09/16/3</url> + <url>https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967</url> + </references> + <dates> + <discovery>2015-09-01</discovery> + <entry>2015-10-10</entry> + </dates> + </vuln> + <vuln vid="a0182578-6e00-11e5-a90c-0026551a22dc"> <topic>PostgreSQL -- minor security problems.</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201510101501.t9AF1tbE032103>