Date: Fri, 12 Apr 2019 08:43:30 +0000 (UTC) From: Vasil Dimov <vd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r498705 - head/security/vuxml Message-ID: <201904120843.x3C8hUD7002119@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: vd Date: Fri Apr 12 08:43:29 2019 New Revision: 498705 URL: https://svnweb.freebsd.org/changeset/ports/498705 Log: Document ftp/wget's metadata in extended attributes vulnerability Security: CVE-2018-20483 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Apr 12 08:19:29 2019 (r498704) +++ head/security/vuxml/vuln.xml Fri Apr 12 08:43:29 2019 (r498705) @@ -58,6 +58,40 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a737eb11-5cfc-11e9-ab87-8cec4bf8fcfb"> + <topic>wget -- security flaw in caching credentials passed as a part of the URL</topic> + <affects> + <package> + <name>wget</name> + <range><ge>1.19</ge><lt>1.20.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Gynvael Coldwind reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483"> + <p> + set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a + file's origin URL in the user.xdg.origin.url metadata attribute + of the extended attributes of the downloaded file, which allows + local users to obtain sensitive information (e.g., credentials + contained in the URL) by reading this attribute, as demonstrated + by getfattr. This also applies to Referer information in the + user.xdg.referrer.url metadata attribute. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483</url> + <cvename>CVE-2018-20483</cvename> + </references> + <dates> + <discovery>2018-12-25</discovery> + <entry>2019-04-12</entry> + </dates> + </vuln> + <vuln vid="a0602fa0-5c1c-11e9-abd6-001b217b3468"> <topic>Gitlab -- Group Runner Registration Token Exposure</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201904120843.x3C8hUD7002119>