Date: Wed, 29 Nov 2017 14:26:57 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r455112 - head/security/vuxml Message-ID: <201711291426.vATEQvBv017474@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Wed Nov 29 14:26:57 2017 New Revision: 455112 URL: https://svnweb.freebsd.org/changeset/ports/455112 Log: security/vuxml: Document cURL vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Nov 29 13:54:31 2017 (r455111) +++ head/security/vuxml/vuln.xml Wed Nov 29 14:26:57 2017 (r455112) @@ -58,6 +58,59 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="301a01b7-d50e-11e7-ac58-b499baebfeaf"> + <topic>cURL -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>curl</name> + <range><gt>7.21.0</gt><lt>7.57.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The cURL project reports:</p> + <blockquote cite="https://curl.haxx.se/changes.html"> + <ul><li><p>NTLM buffer overflow via integer overflow + (CVE-2017-8816)<br/>libcurl contains a buffer overrun flaw + in the NTLM authentication code. + The internal function Curl_ntlm_core_mk_ntlmv2_hash sums up + the lengths of the user name + password (= SUM) and multiplies + the sum by two (= SIZE) to figure out how large storage to + allocate from the heap.</p> + <p>FTP wildcard out of bounds read (CVE-2017-8817)<br/> + libcurl contains a read out of bounds flaw in the FTP wildcard + function. + libcurl's FTP wildcard matching feature, which is enabled with + the CURLOPT_WILDCARDMATCH option can use a built-in wildcard + function or a user provided one. The built-in wildcard function + has a flaw that makes it not detect the end of the pattern + string if it ends with an open bracket ([) but instead it will + continue reading the heap beyond the end of the URL buffer that + holds the wildcard.</p> + <p>SSL out of buffer access (CVE-2017-8818)<br/> + libcurl contains an out boundary access flaw in SSL related code. + When allocating memory for a connection (the internal struct + called connectdata), a certain amount of memory is allocated at + the end of the struct to be used for SSL related structs. Those + structs are used by the particular SSL library libcurl is built + to use. The application can also tell libcurl which specific SSL + library to use if it was built to support more than one. + </p></li></ul> + </blockquote> + </body> + </description> + <references> + <url>https://curl.haxx.se/changes.html</url> + <cvename>CVE-2017-8816</cvename> + <cvename>CVE-2017-8817</cvename> + <cvename>CVE-2017-8818</cvename> + </references> + <dates> + <discovery>2017-11-29</discovery> + <entry>2017-11-29</entry> + </dates> + </vuln> + <vuln vid="0d369972-d4ba-11e7-bfca-005056925db4"> <topic>borgbackup -- remote users can override repository restrictions</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201711291426.vATEQvBv017474>