Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Sep 2007 20:44:16 GMT
From:      Nick Barkas <snb@threerings.net>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/116060: [patch] security/vuxml update for vulnerabilities in devel/bugzilla and other bugzilla ports
Message-ID:  <200709032044.l83KiGpv091541@www.freebsd.org>
Resent-Message-ID: <200709032050.l83Ko2OK017275@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         116060
>Category:       ports
>Synopsis:       [patch] security/vuxml update for vulnerabilities in devel/bugzilla and other bugzilla ports
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Mon Sep 03 20:50:01 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator:     Nick Barkas
>Release:        7.0-CURRENT
>Organization:
Three Rings Design
>Environment:
FreeBSD freebsd-current.localdomain 7.0-CURRENT-200706 FreeBSD 7.0-CURRENT-200706 #0: Sun Jun  3 18:41:02 UTC 2007     root@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
>Description:
http://www.bugzilla.org/security/2.20.4/ lists a number of vulnerabilities in Bugzilla. This is an update to the VuXML document to notify users of Bugzilla ports about these.
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -urN vuxml.orig/vuln.xml vuxml/vuln.xml
--- vuxml.orig/vuln.xml	Mon Sep  3 21:58:32 2007
+++ vuxml/vuln.xml	Mon Sep  3 22:38:29 2007
@@ -34,6 +34,53 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="75231c63-f6a2-499d-8e27-787773bda284">
+    <topic>bugzilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+        <name>bugzilla</name>
+        <name>ja-bugzilla</name>
+        <range><lt>3.0.1</lt></range>
+      </package>
+      <package>
+        <name>bugzilla2</name>
+        <range><lt>2.22.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+        <p>A Bugzilla Security Advisory reports:</p>
+        <blockquote cite="http://www.bugzilla.org/security/2.20.4/">;
+          <p>This advisory covers three security issues that have recently been
+            fixed in the Bugzilla code:</p>
+          <ul>
+            <li>A possible cross-site scripting (XSS) vulnerability when filing
+              bugs using the guided form.</li>
+            <li>When using email_in.pl, insufficiently escaped data may be 
+              passed to sendmail.</li>
+            <li>Users using the WebService interface may access Bugzilla's 
+              time-tracking fields even if they normally cannot see them.</li>
+          </ul>
+          <p>We strongly advise that 2.20.x and 2.22.x users should upgrade to 
+            2.20.5 and 2.22.3 respectively. 3.0 users, and users of 2.18.x or 
+            below, should upgrade to 3.0.1.</p>
+        </blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.bugzilla.org/security/2.20.4/</url>;
+      <cvename>CVE-2007-4538</cvename>
+      <cvename>CVE-2007-4539</cvename>
+      <cvename>CVE-2007-4543</cvename>
+      <bid>25425</bid>
+      <url>http://secunia.com/advisories/26584</url>;
+    </references>
+    <dates>
+      <discovery>2007-8-23</discovery>
+      <entry>2007-9-3</entry>
+    </dates>
+  </vuln>
+  
   <vuln vid="45500f74-5947-11dc-87c1-000e2e5785ad">
     <topic>fetchmail -- denial of service on reject of local warning
       message</topic>


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200709032044.l83KiGpv091541>