Date: Wed, 1 May 2024 20:09:39 GMT From: Thomas Zander <riggs@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 55d99e03b41e - main - security/vuxml: Document buffer overflow in korean/hcode Message-ID: <202405012009.441K9dCY018641@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by riggs: URL: https://cgit.FreeBSD.org/ports/commit/?id=55d99e03b41e079ef82dfb54fa9eb13b54e57133 commit 55d99e03b41e079ef82dfb54fa9eb13b54e57133 Author: Thomas Zander <riggs@FreeBSD.org> AuthorDate: 2024-05-01 20:06:43 +0000 Commit: Thomas Zander <riggs@FreeBSD.org> CommitDate: 2024-05-01 20:06:43 +0000 security/vuxml: Document buffer overflow in korean/hcode Before ko-hcode-2.1.3_2, the port was affected by CVE-2024-34020, where a buffer overflow can be exploited to (at least) crash the program. --- security/vuxml/vuln/2024.xml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 3b5800d55335..5db3845477dc 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,29 @@ + <vuln vid="da4adc02-07f4-11ef-960d-5404a68ad561"> + <topic>hcode -- buffer overflow in mail.c</topic> + <affects> + <package> + <name>ko-hcode</name> + <range><lt>2.1.3_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The openSUSE project reports:</p> + <blockquote cite="https://bugzilla.suse.com/show_bug.cgi?id=1223534"> + <p>The problematic function in question is putSDN() in mail.c. The static variable `cp` is used as an index for a fixed-sized buffer `ibuf`. There is a range check: `if ( cp >= HDR_BUF_LEN ) ...` but under certain circumstances, cp can be incremented beyond the buffer size, leading to a buffer overwrite</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-34020</cvename> + <url>https://bugzilla.suse.com/show_bug.cgi?id=1223534</url> + </references> + <dates> + <discovery>2024-04-29</discovery> + <entry>2024-05-01</entry> + </dates> + </vuln> + <vuln vid="5da8b1e6-0591-11ef-9e00-080027957747"> <topic>GLPI -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202405012009.441K9dCY018641>