From owner-svn-ports-all@freebsd.org Thu Apr 20 08:39:55 2017 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2E5BDD4613E; Thu, 20 Apr 2017 08:39:55 +0000 (UTC) (envelope-from jbeich@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E5694358; Thu, 20 Apr 2017 08:39:54 +0000 (UTC) (envelope-from jbeich@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v3K8dsUL085208; Thu, 20 Apr 2017 08:39:54 GMT (envelope-from jbeich@FreeBSD.org) Received: (from jbeich@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v3K8drFR085206; Thu, 20 Apr 2017 08:39:53 GMT (envelope-from jbeich@FreeBSD.org) Message-Id: <201704200839.v3K8drFR085206@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: jbeich set sender to jbeich@FreeBSD.org using -f From: Jan Beich Date: Thu, 20 Apr 2017 08:39:53 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r438933 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 20 Apr 2017 08:39:55 -0000 Author: jbeich Date: Thu Apr 20 08:39:53 2017 New Revision: 438933 URL: https://svnweb.freebsd.org/changeset/ports/438933 Log: security/vuxml: mark some firefox < 53 bundled deps as vulnerable Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Apr 20 08:27:09 2017 (r438932) +++ head/security/vuxml/vuln.xml Thu Apr 20 08:39:53 2017 (r438933) @@ -58,6 +58,130 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + graphite2 -- out-of-bounds write with malicious font + + + graphite2 + linux-c7-graphite2 + 1.3.10 + + + + +

Mozilla Foundation reports:

+
+

An out-of-bounds write in the Graphite 2 library + triggered with a maliciously crafted Graphite font. This + results in a potentially exploitable crash. This issue was + fixed in the Graphite 2 library as well as Mozilla + products.

+
+ +
+ + CVE-2017-5436 + https://github.com/silnrsi/graphite/commit/1ce331d5548b + + + 2017-04-19 + 2017-04-19 + +
+ + + libevent -- multiple vulnerabilities + + + libevent + libevent2 + linux-c6-libevent2 + linux-c7-libevent + 2.1.6 + + + + +

Debian Security reports:

+
+

CVE-2016-10195: The name_parse function in evdns.c in + libevent before 2.1.6-beta allows remote attackers to have + unspecified impact via vectors involving the label_len + variable, which triggers an out-of-bounds stack read.

+

CVE-2016-10196: Stack-based buffer overflow in the + evutil_parse_sockaddr_port function in evutil.c in libevent + before 2.1.6-beta allows attackers to cause a denial of + service (segmentation fault) via vectors involving a long + string in brackets in the ip_as_string argument.

+

CVE-2016-10197: The search_make_new function in evdns.c + in libevent before 2.1.6-beta allows attackers to cause a + denial of service (out-of-bounds read) via an empty + hostname.

+
+ +
+ + CVE-2016-10195 + CVE-2016-10196 + CVE-2016-10197 + http://www.openwall.com/lists/oss-security/2017/01/31/17 + https://github.com/libevent/libevent/issues/317 + https://github.com/libevent/libevent/issues/318 + https://github.com/libevent/libevent/issues/332 + https://github.com/libevent/libevent/issues/335 + + + 2017-01-31 + 2017-04-19 + +
+ + + NSS -- multiple vulnerabilities + + + nss + linux-f10-nss + linux-c6-nss + linux-c7-nss + 3.303.30.1 + 3.293.29.5 + 3.223.28.4 + 3.21.4 + + + + +

Mozilla Foundation reports:

+
+

An out-of-bounds write during Base64 decoding operation + in the Network Security Services (NSS) library due to + insufficient memory being allocated to the buffer. This + results in a potentially exploitable crash. The NSS library + has been updated to fix this issue to address this issue and + Firefox 53 has been updated with NSS version 3.29.5.

+
+
+

A flaw in DRBG number generation within the Network + Security Services (NSS) library where the internal state V + does not correctly carry bits over. The NSS library has been + updated to fix this issue to address this issue and Firefox + 53 has been updated with NSS version 3.29.5.

+
+ +
+ + CVE-2017-5461 + CVE-2017-5462 + https://hg.mozilla.org/projects/nss/rev/99a86619eac9 + https://hg.mozilla.org/projects/nss/rev/e126381a3c29 + + + 2017-03-17 + 2017-04-19 + +
+ mozilla -- multiple vulnerabilities