Date: Sun, 17 May 2020 20:42:25 +0000 (UTC) From: Ryan Steinmetz <zi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r535678 - head/security/vuxml Message-ID: <202005172042.04HKgPu2093322@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: zi Date: Sun May 17 20:42:24 2020 New Revision: 535678 URL: https://svnweb.freebsd.org/changeset/ports/535678 Log: - Document security/clamav vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun May 17 20:42:11 2020 (r535677) +++ head/security/vuxml/vuln.xml Sun May 17 20:42:24 2020 (r535678) @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="91ce95d5-cd15-4105-b942-af5ccc7144c1"> + <topic>clamav -- multiple vulnerabilities</topic> + <affects> + <package> + <name>clamav</name> + <range><lt>0.102.3,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Micah Snyder reports:</p> + <blockquote cite="https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html"> + <p>CVE-2020-3327: Fixed a vulnerability in the ARJ archive-parsing module + in ClamAV 0.102.2 that could cause a denial-of-service condition. + Improper bounds checking of an unsigned variable results in an + out-of-bounds read which causes a crash. Special thanks to Daehui Chang + and Fady Othman for helping identify the ARJ parsing vulnerability. + </p> + <p>CVE-2020-3341: Fixed a vulnerability in the PDF-parsing module in ClamAV + 0.101 - 0.102.2 that could cause a denial-of-service condition. Improper + size checking of a buffer used to initialize AES decryption routines + results in an out-of-bounds read, which may cause a crash. OSS-Fuzz + discovered this vulnerability. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html</url> + <cvename>CVE-2020-3327</cvename> + <cvename>CVE-2020-3341</cvename> + </references> + <dates> + <discovery>2020-05-12</discovery> + <entry>2020-05-14</entry> + </dates> + </vuln> + <vuln vid="ce6db19b-976e-11ea-93c4-08002728f74c"> <topic>Rails -- remote code execution vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202005172042.04HKgPu2093322>