Index: net-im/py-slixmpp/Makefile =================================================================== --- net-im/py-slixmpp/Makefile +++ net-im/py-slixmpp/Makefile @@ -1,8 +1,7 @@ # $FreeBSD$ PORTNAME= slixmpp -DISTVERSION= 1.4.1 -PORTREVISION= 1 +DISTVERSION= 1.4.2 CATEGORIES= net-im python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} Index: net-im/py-slixmpp/distinfo =================================================================== --- net-im/py-slixmpp/distinfo +++ net-im/py-slixmpp/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1546111826 -SHA256 (slixmpp-1.4.1.tar.gz) = 020acd4507fd00c38835b78b5f338db60d3df840187623e0d41ab2ca89d7ae57 -SIZE (slixmpp-1.4.1.tar.gz) = 862964 +TIMESTAMP = 1551309637 +SHA256 (slixmpp-1.4.2.tar.gz) = c3204fbe8ded148e1eca6720ba0398298c159f29ec76dfc6f7dd7ed999ae1767 +SIZE (slixmpp-1.4.2.tar.gz) = 864608 Index: security/vuxml/vuln.xml =================================================================== --- security/vuxml/vuln.xml +++ security/vuxml/vuln.xml @@ -58,6 +58,43 @@ * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + slixmpp -- improper access control + + + py35-slixmpp + py36-slixmpp + py37-slixmpp + 1.4.2 + + + + +

NVD reports:

+
+

slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 + contains an incorrect Access Control vulnerability in XEP-0223 plugin + (Persistent Storage of Private Data via PubSub) options profile, used + for the configuration of default access model that can result in + all of the contacts of the victim can see private data having been + published to a PEP node. This attack appears to be exploitable + if the user of this library publishes any private data on PEP, + the node isn't configured to be private. This vulnerability appears + to have been fixed in commit 7cd73b594e8122dddf847953fcfc85ab4d316416 + which is included in slixmpp 1.4.2.

+
+ +
+ + https://nvd.nist.gov/vuln/detail/CVE-2019-1000021 + CVE-2019-1000021 + + + 2019-02-04 + 2019-02-27 + +
+ webkit-gtk -- Multiple vulnabilities