Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Feb 2017 17:05:28 +0000 (UTC)
From:      Christoph Moench-Tegeder <cmt@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r433054 - head/security/vuxml
Message-ID:  <201702011705.v11H5SRm082271@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cmt
Date: Wed Feb  1 17:05:28 2017
New Revision: 433054
URL: https://svnweb.freebsd.org/changeset/ports/433054

Log:
  document shotwell vulnerability

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Feb  1 17:05:18 2017	(r433053)
+++ head/security/vuxml/vuln.xml	Wed Feb  1 17:05:28 2017	(r433054)
@@ -58,6 +58,38 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="5a9b3d70-48e2-4267-b196-83064cb14fe0">
+    <topic>shotwell -- failure to encrypt authentication</topic>
+    <affects>
+      <package>
+	<name>shotwell</name>
+	<range><lt>0.24.5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jens Georg reports:</p>
+	<blockquote cite="https://mail.gnome.org/archives/shotwell-list/2017-January/msg00048.html">;
+	  <p>I have just released Shotwell 0.24.5 and 0.25.4 which turn
+	  on HTTPS encyption all over the publishing plugins.</p>
+	  <p>Users using Tumblr and Yandex.Fotki publishing are strongly
+	  advised to change their passwords and reauthenticate Shotwell
+	  to those services after upgrade.</p>
+	  <p>Users of Picasa and Youtube publishing are strongly advised
+	  to reauthenticate (Log out and back in) Shotwell to those
+	  services after upgrade.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://mail.gnome.org/archives/shotwell-list/2017-January/msg00048.html</url>;
+    </references>
+    <dates>
+      <discovery>2017-01-31</discovery>
+      <entry>2017-02-01</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="5cfa9d0c-73d7-4642-af4f-28fbed9e9404">
     <topic>jenkins -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201702011705.v11H5SRm082271>