Date: Sun, 26 May 2019 13:17:17 +0000 (UTC) From: Carlo Strub <cs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r502715 - head/security/vuxml Message-ID: <201905261317.x4QDHH2e005218@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cs Date: Sun May 26 13:17:17 2019 New Revision: 502715 URL: https://svnweb.freebsd.org/changeset/ports/502715 Log: suricata vulnerability Security: CVE-2019-10053 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun May 26 13:10:29 2019 (r502714) +++ head/security/vuxml/vuln.xml Sun May 26 13:17:17 2019 (r502715) @@ -58,6 +58,32 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3b903bf3-7f94-11e9-8a5f-c85b76ce9b5a"> + <topic>suricata -- buffer over-read</topic> + <affects> + <package> + <name>suricata</name> + <range><lt>4.1.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mitre reports:</p> + <blockquote cite=""> + <p>An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.</p> + </blockquote> + </body> + </description> + <references> + <url>https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/</url> + <cvename>CVE-2019-10053</cvename> + </references> + <dates> + <discovery>2019-03-15</discovery> + <entry>2019-05-26</entry> + </dates> + </vuln> + <vuln vid="dd343a2b-7ee7-11e9-a290-8ddc52868fa9"> <topic>curl -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201905261317.x4QDHH2e005218>