From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (unknown [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 359A41381FA for ; Wed, 28 May 2014 06:50:59 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 84019E08AC; Wed, 28 May 2014 06:50:58 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 21C00E08AC for ; Wed, 28 May 2014 06:50:58 +0000 (UTC) Received: from flycatcher.gentoo.org (unknown [81.93.255.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 2F0EA33FD38 for ; Wed, 28 May 2014 06:50:57 +0000 (UTC) Received: by flycatcher.gentoo.org (Postfix, from userid 2329) id CD4382004E; Wed, 28 May 2014 06:50:54 +0000 (UTC) From: "Sergey Popov (pinkbyte)" To: gentoo-commits@lists.gentoo.org Reply-To: gentoo-dev@lists.gentoo.org, pinkbyte@gentoo.org Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201405-28.xml X-VCS-Repository: gentoo X-VCS-Files: glsa-201405-28.xml X-VCS-Directories: xml/htdocs/security/en/glsa X-VCS-Committer: pinkbyte X-VCS-Committer-Name: Sergey Popov Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Message-Id: <20140528065054.CD4382004E@flycatcher.gentoo.org> Date: Wed, 28 May 2014 06:50:54 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: fe119e74-e462-4bf4-afaf-d480bb124b0d X-Archives-Hash: 7e15a291d57190a3c86bdb731f4905d8 pinkbyte 14/05/28 06:50:54 Added: glsa-201405-28.xml Log: GLSA 201405-28 Revision Changes Path 1.1 xml/htdocs/security/en/glsa/glsa-201405-28.xml file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201405-28.xml?rev=1.1&view=markup plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201405-28.xml?rev=1.1&content-type=text/plain Index: glsa-201405-28.xml =================================================================== xmonad-contrib: Arbitrary code execution A remote command injection vulnerability has been discovered in xmonad-contrib. xmonad-contrib May 28, 2014 May 28, 2014: 1 478288 remote 0.11.2 0.11.2

xmonad-contrib is a set of third party tiling algorithms, configurations, and scripts for xmonad.

A vulnerability in the Xmonad.Hooks.DynamicLog module could allow a malicious website with a specially crafted title to inject commands into the title bar which would be executed when the bar is clicked.

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

There is no known workaround at this time.

All xmonad-contrib users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=x11-wm/xmonad-contrib-0.11.2"
CVE-2013-1436 pinkbyte pinkbyte