Date: Sun, 3 Jul 2016 18:44:39 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r417989 - head/security/vuxml Message-ID: <201607031844.u63IidJw087154@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Sun Jul 3 18:44:39 2016 New Revision: 417989 URL: https://svnweb.freebsd.org/changeset/ports/417989 Log: Document SQLite3 tempdir selection vulnerability PR: 210751 Submitted by: Vladimir Krstulja <vlad-fbsd@acheronmedia.com> Security: CVE-2016-6153 Security: https://vuxml.FreeBSD.org/freebsd/546deeea-3fc6-11e6-a671-60a44ce6887b.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Jul 3 18:37:34 2016 (r417988) +++ head/security/vuxml/vuln.xml Sun Jul 3 18:44:39 2016 (r417989) @@ -58,6 +58,41 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="546deeea-3fc6-11e6-a671-60a44ce6887b"> + <topic>SQLite3 -- Tempdir Selection Vulnerability</topic> + <affects> + <package> + <name>sqlite3</name> + <range><lt>3.13.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>KoreLogic security reports:</p> + <blockquote cite="https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt"> + <p>Affected versions of SQLite reject potential tempdir locations if + they are not readable, falling back to '.'. Thus, SQLite will favor + e.g. using cwd for tempfiles on such a system, even if cwd is an + unsafe location. Notably, SQLite also checks the permissions of + '.', but ignores the results of that check.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-6153</cvename> + <freebsdpr>ports/209827</freebsdpr> + <url>https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt</url> + <url>http://openwall.com/lists/oss-security/2016/07/01/2</url> + <url>http://www.sqlite.org/cgi/src/info/67985761aa93fb61</url> + <url>http://www.sqlite.org/cgi/src/info/b38fe522cfc971b3</url> + <url>http://www.sqlite.org/cgi/src/info/614bb709d34e1148</url> + </references> + <dates> + <discovery>2016-07-01</discovery> + <entry>2016-07-03</entry> + </dates> + </vuln> + <vuln vid="8d5368ef-40fe-11e6-b2ec-b499baebfeaf"> <topic>Python 2.7 -- smtplib StartTLS stripping vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201607031844.u63IidJw087154>