svn commit: r499927 - head/security/vuxml
Jose Alonso Cardenas Marquez
acm at FreeBSD.org
Thu Apr 25 02:05:06 UTC 2019
Author: acm
Date: Thu Apr 25 02:05:05 2019
New Revision: 499927
URL: https://svnweb.freebsd.org/changeset/ports/499927
Log:
- Add drupal7 and drupal8 entries
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Apr 25 01:32:49 2019 (r499926)
+++ head/security/vuxml/vuln.xml Thu Apr 25 02:05:05 2019 (r499927)
@@ -58,6 +58,51 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="2bad8b5d-66fb-11e9-9815-78acc0a3b880">
+ <topic>drupal -- Drupal core - Moderately critical</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.66</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-005">
+ <p>CVE-2019-10909: Escape validation messages in the PHP templating engine.</p>
+ <p>CVE-2019-10910: Check service IDs are valid.</p>
+ <p>CVE-2019-10911: Add a separator in the remember me cookie hash.</p>
+ </blockquote>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-006">
+ <p>jQuery 3.4.0 includes a fix for some unintended behavior when using
+ jQuery.extend(true, {}, ...). If an unsanitized source object contained
+ an enumerable __proto__ property, it could extend the native Object.prototype.
+ This fix is included in jQuery 3.4.0, but patch diffs exist to patch previous
+ jQuery versions.</p>
+
+ <p>It's possible that this vulnerability is exploitable with some Drupal modules.
+ As a precaution, this Drupal security release backports the fix to jQuery.extend(),
+ without making any other changes to the jQuery version that is included in
+ Drupal core (3.2.1 for Drupal 8 and 1.4.4 for Drupal 7) or running on the site
+ via some other module such as jQuery Update.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/SA-CORE-2019-005</url>
+ <url>https://www.drupal.org/SA-CORE-2019-006</url>
+ </references>
+ <dates>
+ <discovery>2019-04-17</discovery>
+ <entry>2019-04-25</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f6ea18bb-65b9-11e9-8b31-002590045d9c">
<topic>py-yaml -- arbitrary code execution</topic>
<affects>
More information about the svn-ports-head
mailing list