Date: Thu, 24 Nov 2022 16:18:38 GMT From: =?utf-8?Q?Fernando=20Apestegu=C3=ADa?= <fernape@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 119b6f865b2c - main - security/vuxml: Add multiple CVEs for advancecomp Message-ID: <202211241618.2AOGIceq010167@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=119b6f865b2c45ab1ba927e62bf41e122fb4ea08 commit 119b6f865b2c45ab1ba927e62bf41e122fb4ea08 Author: Fernando ApesteguĂa <fernape@FreeBSD.org> AuthorDate: 2022-11-24 16:13:42 +0000 Commit: Fernando ApesteguĂa <fernape@FreeBSD.org> CommitDate: 2022-11-24 16:14:42 +0000 security/vuxml: Add multiple CVEs for advancecomp PR: 267937 --- security/vuxml/vuln/2022.xml | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/security/vuxml/vuln/2022.xml b/security/vuxml/vuln/2022.xml index 6df45ca26664..53684beae82a 100644 --- a/security/vuxml/vuln/2022.xml +++ b/security/vuxml/vuln/2022.xml @@ -1,3 +1,46 @@ + <vuln vid="b6a84729-6bd0-11ed-8d9a-b42e991fc52e"> + <topic>advancecomp -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>advancecomp</name> + <range><lt>2.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>GitHub advisories reports:</p> + <blockquote cite="https://github.com/advisories/GHSA-8xqx-5mpr-g8xj"> + <p>Multiple vulnerabilities found in advancecomp including:</p> + <ul> + <li>Three segmentation faults.</li> + <li>Heap buffer overflow via le_uint32_read at /lib/endianrw.h.</li> + <li>Three more heap buffer overflows.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-35014</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35014</url> + <cvename>CVE-2022-35015</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35015</url> + <cvename>CVE-2022-35016</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35016</url> + <cvename>CVE-2022-35017</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35017</url> + <cvename>CVE-2022-35018</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35018</url> + <cvename>CVE-2022-35019</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35019</url> + <cvename>CVE-2022-35020</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2022-35020</url> + </references> + <dates> + <discovery>2022-08-29</discovery> + <entry>2022-11-24</entry> + </dates> + </vuln> + <vuln vid="e0f26ac5-6a17-11ed-93e7-901b0e9408dc"> <topic>tailscale -- Security vulnerability in the client</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202211241618.2AOGIceq010167>