Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 27 Feb 2020 10:23:33 +0000 (UTC)
From:      Dima Panov <fluffy@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r527243 - head/security/vuxml
Message-ID:  <202002271023.01RANX1Y004805@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: fluffy
Date: Thu Feb 27 10:23:32 2020
New Revision: 527243
URL: https://svnweb.freebsd.org/changeset/ports/527243

Log:
  security/vuxml: fix vuxml entries for OpenSMTPd, remove duplicates with wrong version and missed description
  
  Approved by:	ports-secteam (miwi)

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Feb 27 09:31:48 2020	(r527242)
+++ head/security/vuxml/vuln.xml	Thu Feb 27 10:23:32 2020	(r527243)
@@ -59,7 +59,7 @@ Notes:
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
   <vuln vid="f0683976-5779-11ea-8a77-1c872ccb1e42">
-    <topic>LPE and RCE in OpenSMTPD's default install</topic>
+    <topic>OpenSMTPd -- LPE and RCE in OpenSMTPD's default install</topic>
     <affects>
       <package>
 	<name>opensmtpd</name>
@@ -68,12 +68,16 @@ Notes:
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>OpenSMTPD developersreports:</p>
+	<p>OpenSMTPD developers reports:</p>
 	<blockquote cite="https://opensmtpd.org/security.html">;
 	  <p>An out of bounds read in smtpd allows an attacker to inject arbitrary
 	    commands into the envelope file which are then executed as root.
 	    Separately, missing privilege revocation in smtpctl allows arbitrary
 	    commands to be run with the _smtpq group.</p>
+	  <p>An unprivileged local attacker can read the first line of an arbitrary
+	    file (for example, root's password hash in /etc/master.passwd) or the
+	    entire contents of another user's file (if this file and
+	    /var/spool/smtpd/ are on the same filesystem).</p>
 	</blockquote>
       </body>
     </description>
@@ -86,62 +90,7 @@ Notes:
     <dates>
       <discovery>2020-02-22</discovery>
       <entry>2020-02-24</entry>
-    </dates>
-  </vuln>
-
-  <vuln vid="40c75597-574a-11ea-bff8-c85b76ce9b5a">
-    <topic>OpenSMTPd -- LPE and RCE in OpenSMTPD's default install</topic>
-    <affects>
-      <package>
-	<name>opensmtpd</name>
-	<range><lt>6.6.5,1</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Qualys reports:</p>
-	<blockquote cite="https://www.openwall.com/lists/oss-security/2020/02/24/5">;
-	  <p>.</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <url>https://www.openwall.com/lists/oss-security/2020/02/24/5</url>;
-      <cvename>CVE-2020-8794</cvename>
-    </references>
-    <dates>
-      <discovery>2020-02-24</discovery>
-      <entry>2020-02-24</entry>
-    </dates>
-  </vuln>
-
-  <vuln vid="76f1ce19-5749-11ea-bff8-c85b76ce9b5a">
-    <topic>OpenSMTPd -- Local information disclosure</topic>
-    <affects>
-      <package>
-	<name>opensmtpd</name>
-	<range><lt>6.6.4,1</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Qualys reports:</p>
-	<blockquote cite="https://www.openwall.com/lists/oss-security/2020/02/24/4">;
-	  <p>We discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server:
-an unprivileged local attacker can read the first line of an arbitrary
-file (for example, root's password hash in /etc/master.passwd) or the
-entire contents of another user's file (if this file and
-/var/spool/smtpd/ are on the same filesystem).</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <url>https://www.openwall.com/lists/oss-security/2020/02/24/4</url>;
-      <cvename>CVE-2020-8793</cvename>
-    </references>
-    <dates>
-      <discovery>2020-02-24</discovery>
-      <entry>2020-02-24</entry>
+      <modified>2020-02-27</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202002271023.01RANX1Y004805>