Date: Fri, 7 Jul 2017 07:59:54 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r445212 - head/security/vuxml Message-ID: <201707070759.v677xsFS077104@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Fri Jul 7 07:59:54 2017 New Revision: 445212 URL: https://svnweb.freebsd.org/changeset/ports/445212 Log: security/vuxml: Register oniguruma/php-mbstring vulns Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 7 07:51:52 2017 (r445211) +++ head/security/vuxml/vuln.xml Fri Jul 7 07:59:54 2017 (r445212) @@ -58,6 +58,82 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b396cf6c-62e6-11e7-9def-b499baebfeaf"> + <topic>oniguruma -- multiple vulnerabilities</topic> + <affects> + <package> + <name>oniguruma4</name> + <range><lt>4.7.2</lt></range> + </package> + <package> + <name>oniguruma5</name> + <range><lt>5.9.7</lt></range> + </package> + <package> + <name>oniguruma6</name> + <range><lt>6.4.0</lt></range> + </package> + <package> + <name>php56-mbstring</name> + <range><lt>5.6.31</lt></range> + </package> + <package> + <name>php70-mbstring</name> + <range><lt>7.0.21</lt></range> + </package> + <package> + <name>php71-mbstring</name> + <range><lt>7.1.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>the PHP project reports:</p> + <blockquote cite="http://php.net/ChangeLog-7.php"> + <ul> + <li>A stack out-of-bounds read occurs in match_at() during regular + expression searching. A logical error involving order of validation + and access in match_at() could result in an out-of-bounds read from + a stack buffer (CVE-2017-9224).</li> + <li>A heap out-of-bounds write or read occurs in next_state_val() + during regular expression compilation. Octal numbers larger than 0xff + are not handled correctly in fetch_token() and fetch_token_in_cc(). + A malformed regular expression containing an octal number in the form + of '\700' would produce an invalid code point value larger than 0xff + in next_state_val(), resulting in an out-of-bounds write memory + corruption (CVE-2017-9226).</li> + <li>A stack out-of-bounds read occurs in mbc_enc_len() during regular + expression searching. Invalid handling of reg->dmin in + forward_search_range() could result in an invalid pointer dereference, + as an out-of-bounds read from a stack buffer (CVE-2017-9227).</li> + <li>A heap out-of-bounds write occurs in bitset_set_range() during + regular expression compilation due to an uninitialized variable from + an incorrect state transition. An incorrect state transition in + parse_char_class() could create an execution path that leaves a + critical local variable uninitialized until it's used as an index, + resulting in an out-of-bounds write memory corruption (CVE-2017-9228).</li> + <li>A SIGSEGV occurs in left_adjust_char_head() during regular expression + compilation. Invalid handling of reg->dmax in forward_search_range() could + result in an invalid pointer dereference, normally as an immediate + denial-of-service condition (CVE-2017-9228).</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>INSERT BLOCKQUOTE URL HERE</url> + <cvename>CVE-2017-9224</cvename> + <cvename>CVE-2017-9226</cvename> + <cvename>CVE-2017-9227</cvename> + <cvename>CVE-2017-9228</cvename> + <cvename>CVE-2017-9228</cvename> + </references> + <dates> + <discovery>2017-07-06</discovery> + <entry>2017-07-07</entry> + </dates> + </vuln> + <vuln vid="4fc2df49-6279-11e7-be0f-6cf0497db129"> <topic>drupal -- Drupal Core - Multiple Vulnerabilities</topic> <affects> @@ -72,13 +148,13 @@ Notes: </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Drupal Security Team Reports:</p> - <blockquote cite="https://www.drupal.org/SA-CORE-2017-003"> - <p>CVE-2017-6920: PECL YAML parser unsafe object handling.</p> - <p>CVE-2017-6921: File REST resource does not properly validate</p> - <p>CVE-2017-6922: Files uploaded by anonymous users into a private - file system can be accessed by other anonymous users.</p> - </blockquote> + <p>Drupal Security Team Reports:</p> + <blockquote cite="https://www.drupal.org/SA-CORE-2017-003"> + <p>CVE-2017-6920: PECL YAML parser unsafe object handling.</p> + <p>CVE-2017-6921: File REST resource does not properly validate</p> + <p>CVE-2017-6922: Files uploaded by anonymous users into a private + file system can be accessed by other anonymous users.</p> + </blockquote> </body> </description> <references>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707070759.v677xsFS077104>