Date: Tue, 22 Sep 2015 17:20:01 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r397557 - head/security/vuxml Message-ID: <201509221720.t8MHK1Qx044327@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Tue Sep 22 17:20:01 2015 New Revision: 397557 URL: https://svnweb.freebsd.org/changeset/ports/397557 Log: Document vulnerability in security/libssh2 Security: CVE-2015-1782 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Sep 22 17:12:50 2015 (r397556) +++ head/security/vuxml/vuln.xml Tue Sep 22 17:20:01 2015 (r397557) @@ -58,6 +58,36 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9770d6ac-614d-11e5-b379-14dae9d210b8"> + <topic>libssh2 -- denial of service vulnerability</topic> + <affects> + <package> + <name>libssh2</name> + <range><lt>1.5.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mariusz Ziulek reports:</p> + <blockquote cite="http://www.libssh2.org/adv_20150311.html"> + <p>A malicious attacker could man in the middle a real server + and cause libssh2 using clients to crash (denial of service) or + otherwise read and use completely unintended memory areas in this + process.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.libssh2.org/adv_20150311.html</url> + <url>https://trac.libssh2.org/ticket/294</url> + <cvename>CVE-2015-1782</cvename> + </references> + <dates> + <discovery>2015-01-25</discovery> + <entry>2015-09-22</entry> + </dates> + </vuln> + <vuln vid="2d56c7f4-b354-428f-8f48-38150c607a05"> <topic>mozilla -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201509221720.t8MHK1Qx044327>