svn commit: r341466 - head/security/vuxml

Remko Lodder remko at FreeBSD.org
Tue Jan 28 07:27:51 UTC 2014


On 27 Jan 2014, at 23:46, Matthew Seaman <matthew at freebsd.org> wrote:

> Author: matthew
> Date: Mon Jan 27 22:46:38 2014
> New Revision: 341466
> URL: http://svnweb.freebsd.org/changeset/ports/341466
> QAT: https://qat.redports.org/buildarchive/r341466/
> 
> Log:
>  Formatting fixes
> 
>  Submitted by:	remko

Thank you!! :-)
Remko

> 
> Modified:
>  head/security/vuxml/vuln.xml
> 
> Modified: head/security/vuxml/vuln.xml
> ==============================================================================
> --- head/security/vuxml/vuln.xml	Mon Jan 27 22:19:40 2014	(r341465)
> +++ head/security/vuxml/vuln.xml	Mon Jan 27 22:46:38 2014	(r341466)
> @@ -68,26 +68,26 @@ Note:  Please add new entries to the beg
> 	<p>The RT development team reports:</p>
> 	<blockquote cite="http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html">
> 	  <p>Versions of RT between 4.2.0 and 4.2.2 (inclusive) are
> -	  vulnerable to a denial-of-service attack via the email
> -	  gateway; any installation which accepts mail from untrusted
> -	  sources is vulnerable, regardless of the permissions
> -	  configuration inside RT. This vulnerability is assigned
> -	  CVE-2014-1474.</p>
> +	    vulnerable to a denial-of-service attack via the email
> +	    gateway; any installation which accepts mail from untrusted
> +	    sources is vulnerable, regardless of the permissions
> +	    configuration inside RT. This vulnerability is assigned
> +	    CVE-2014-1474.</p>
> 	  <p>This vulnerability is caused by poor parsing performance
> -	  in the Email::Address::List module, which RT depends on. We
> -	  recommend that affected users upgrade their version of
> -	  Email::Address::List to v0.02 or above, which resolves the
> -	  issue. Due to a communications mishap, the release on CPAN
> -	  will temporarily appear as "unauthorized," and the
> -	  command-line cpan client will hence not install it. We
> -	  expect this to be resolved shortly; in the meantime, the
> -	  release is also available from our server.</p>
> +	    in the Email::Address::List module, which RT depends on. We
> +	    recommend that affected users upgrade their version of
> +	    Email::Address::List to v0.02 or above, which resolves the
> +	    issue. Due to a communications mishap, the release on CPAN
> +	    will temporarily appear as "unauthorized," and the
> +	    command-line cpan client will hence not install it. We
> +	    expect this to be resolved shortly; in the meantime, the
> +	    release is also available from our server.</p>
> 	</blockquote>
>       </body>
>     </description>
>     <references>
> -      <url>http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html</url>
>       <cvename>CVE-2014-1474</cvename>
> +      <url>http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html</url>
>     </references>
>     <dates>
>       <discovery>2014-01-27</discovery>
> _______________________________________________
> svn-ports-all at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to "svn-ports-all-unsubscribe at freebsd.org"

-- 

/"\   Best regards,                      | remko at FreeBSD.org
\ /   Remko Lodder                       | remko at EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.freebsd.org/pipermail/svn-ports-all/attachments/20140128/435ddc08/attachment.sig>


More information about the svn-ports-all mailing list