View | Details | Raw Unified | Return to bug 232897 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+29 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="deb4f633-de1d-11e8-a9fb-080027f43a02">
62
    <topic>gitea -- remote code exeution</topic>
63
    <affects>
64
      <package>
65
	<name>gitea</name>
66
	<range><lt>1.5.3</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>The Gitea project reports:</p>
72
	<blockquote cite="https://blog.gitea.io/2018/10/gitea-1.5.3-is-released/">
73
	  <p>[This release] contains crit[i]cal security fix for vulnerability
74
	  that could potentially allow for authorized users to do remote code
75
	  ex[e]cution.</p>
76
	</blockquote>
77
      </body>
78
    </description>
79
    <references>
80
      <url>https://github.com/go-gitea/gitea/pull/5177</url>
81
      <url>https://github.com/go-gitea/gitea/pull/5196</url>
82
      <url>https://github.com/go-macaron/session/commit/084f1e5c1071f585902a7552b483cee04bc00a14</url>
83
    </references>
84
    <dates>
85
      <discovery>2018-10-25</discovery>
86
      <entry>2018-11-01</entry>
87
    </dates>
88
  </vuln>
89
61
  <vuln vid="e0ab1773-07c1-46c6-9170-4c5e81c00927">
90
  <vuln vid="e0ab1773-07c1-46c6-9170-4c5e81c00927">
62
    <topic>curl -- multiple vulnerabilities</topic>
91
    <topic>curl -- multiple vulnerabilities</topic>
63
    <affects>
92
    <affects>

Return to bug 232897