Date: Mon, 23 Apr 2018 19:17:27 +0000 (UTC) From: Tijl Coosemans <tijl@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r468132 - head/security/vuxml Message-ID: <201804231917.w3NJHRrk068354@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tijl Date: Mon Apr 23 19:17:27 2018 New Revision: 468132 URL: https://svnweb.freebsd.org/changeset/ports/468132 Log: Document mbed TLS vulnerabilities Security: https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Apr 23 19:12:24 2018 (r468131) +++ head/security/vuxml/vuln.xml Mon Apr 23 19:17:27 2018 (r468132) @@ -58,6 +58,48 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d8382a69-4728-11e8-ba83-0011d823eebd"> + <topic>mbed TLS (PolarSSL) -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mbedtls</name> + <range><lt>2.7.2</lt></range> + </package> + <package> + <name>polarssl13</name> + <range><ge>*</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Simon Butcher reports:</p> + <blockquote cite="https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released"> + <ul> + <li>Defend against Bellcore glitch attacks by verifying the results + of RSA private key operations.</li> + <li>Fix implementation of the truncated HMAC extension. The + previous implementation allowed an offline 2^80 brute force + attack on the HMAC key of a single, uninterrupted connection + (with no resumption of the session).</li> + <li>Reject CRLs containing unsupported critical extensions. Found + by Falko Strenzke and Evangelos Karatsiolis.</li> + <li>Fix a buffer overread in ssl_parse_server_key_exchange() that + could cause a crash on invalid input.</li> + <li>Fix a buffer overread in ssl_parse_server_psk_hint() that could + cause a crash on invalid input.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released</url> + </references> + <dates> + <discovery>2018-03-21</discovery> + <entry>2018-04-23</entry> + </dates> + </vuln> + <vuln vid="57aec168-453e-11e8-8777-b499baebfeaf"> <topic>MySQL -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201804231917.w3NJHRrk068354>