aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKoop Mast <kwm@FreeBSD.org>2017-10-13 16:53:53 +0000
committerKoop Mast <kwm@FreeBSD.org>2017-10-13 16:53:53 +0000
commitfd0c450d4ff3c6f23bb73c7518ef7be38c81920e (patch)
tree92fecf3c02bfaa5d683dd62620c2ac3d7b7dea9c
parent6d16ac2aa8664b00260810a57262b195f5ef5ed5 (diff)
downloadports-fd0c450d4ff3c6f23bb73c7518ef7be38c81920e.tar.gz
ports-fd0c450d4ff3c6f23bb73c7518ef7be38c81920e.zip
Document xorg-server CVEs 2017-12176 through 2017-12187.
While here replace the SO-AND-SO part in the description of the previous xorg-server entry[1], with the Alan Coopersmith who send the announce mail to xorg-announce@ mailing list. [1] entry: 4f8ffb9c-f388-4fbd-b90f-b3131559d888
Notes
Notes: svn path=/head/; revision=452022
-rw-r--r--security/vuxml/vuln.xml60
1 files changed, 59 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d0cc3c3882c5..a51e64aa049f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,64 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="7274e0cc-575f-41bc-8619-14a41b3c2ad0">
+ <topic>xorg-server -- multiple vulnabilities</topic>
+ <affects>
+ <package>
+ <name>xephyr</name>
+ <range><lt>1.18.4_5,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-dmx</name>
+ <range><lt>1.18.4_5,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nestserver</name>
+ <range><lt>1.19.1_2,2</lt></range>
+ </package>
+ <package>
+ <name>xorg-server</name>
+ <range><lt>1.18.4_5,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-vfbserver</name>
+ <range><lt>1.19.1_2,1</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>1.19.1_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adam Jackson reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2017-October/002814.html">
+ <p>One regression fix since 1.19.4 (mea culpa), and fixes for
+ CVEs 2017-12176 through 2017-12187.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.x.org/archives/xorg-announce/2017-October/002814.html</url>
+ <cvename>CVE-2017-12176</cvename>
+ <cvename>CVE-2017-12177</cvename>
+ <cvename>CVE-2017-12178</cvename>
+ <cvename>CVE-2017-12179</cvename>
+ <cvename>CVE-2017-12180</cvename>
+ <cvename>CVE-2017-12181</cvename>
+ <cvename>CVE-2017-12182</cvename>
+ <cvename>CVE-2017-12183</cvename>
+ <cvename>CVE-2017-12184</cvename>
+ <cvename>CVE-2017-12185</cvename>
+ <cvename>CVE-2017-12186</cvename>
+ <cvename>CVE-2017-12187</cvename>
+ </references>
+ <dates>
+ <discovery>2017-10-12</discovery>
+ <entry>2017-10-13</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e837390d-0ceb-46b8-9b32-29c1195f5dc7">
<topic>solr -- Code execution via entity expansion</topic>
<affects>
@@ -423,7 +481,7 @@ Notes:
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>SO-AND-SO reports:</p>
+ <p>Alan Coopersmith reports:</p>
<blockquote cite="https://lists.x.org/archives/xorg-announce/2017-October/002809.html">
<p>X.Org thanks Michal Srb of SuSE for finding these issues
and bringing them to our attention, Julien Cristau of