From owner-svn-ports-head@FreeBSD.ORG Fri Jul 25 14:12:55 2014 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 645AD737; Fri, 25 Jul 2014 14:12:55 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 519202602; Fri, 25 Jul 2014 14:12:55 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s6PECtKx067351; Fri, 25 Jul 2014 14:12:55 GMT (envelope-from ohauer@svn.freebsd.org) Received: (from ohauer@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s6PECtUE067350; Fri, 25 Jul 2014 14:12:55 GMT (envelope-from ohauer@svn.freebsd.org) Message-Id: <201407251412.s6PECtUE067350@svn.freebsd.org> From: Olli Hauer Date: Fri, 25 Jul 2014 14:12:55 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r362910 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Jul 2014 14:12:55 -0000 Author: ohauer Date: Fri Jul 25 14:12:54 2014 New Revision: 362910 URL: http://svnweb.freebsd.org/changeset/ports/362910 QAT: https://qat.redports.org/buildarchive/r362910/ Log: - document bugzilla Cross Site Request Forgery (CVE-2014-1546) MFH: 2014Q3 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 25 14:07:04 2014 (r362909) +++ head/security/vuxml/vuln.xml Fri Jul 25 14:12:54 2014 (r362910) @@ -57,6 +57,36 @@ Notes: --> + + bugzilla -- Cross Site Request Forgery + + + bugzilla44 + 4.4.5 + + + + +

A Bugzilla Security Advisory reports:

+
+

Adobe does not properly restrict the SWF file format, + which allows remote attackers to conduct cross-site + request forgery (CSRF) attacks against Bugzilla's JSONP + endpoint, possibly obtaining sensitive bug information, + via a crafted OBJECT element with SWF content satisfying + the character-set requirements of a callback API.

+
+ +
+ + CVE-2014-1546 + + + 2014-07-24 + 2014-07-25 + +
+ apache22 -- several vulnerabilities