Date: Fri, 19 Apr 2019 14:42:42 +0000 (UTC) From: Tijl Coosemans <tijl@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r499362 - head/security/vuxml Message-ID: <201904191442.x3JEggQN043185@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tijl Date: Fri Apr 19 14:42:42 2019 New Revision: 499362 URL: https://svnweb.freebsd.org/changeset/ports/499362 Log: Document GNUTLS-SA-2019-03-27. Security: https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Apr 19 14:32:12 2019 (r499361) +++ head/security/vuxml/vuln.xml Fri Apr 19 14:42:42 2019 (r499362) @@ -58,6 +58,42 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fb30db8f-62af-11e9-b0de-001cc0382b2f"> + <topic>GnuTLS -- double free, invalid pointer access</topic> + <affects> + <package> + <name>gnutls</name> + <range><lt>3.6.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The GnuTLS project reports:</p> + <blockquote cite="https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27"> + <ul> + <li>Tavis Ormandy from Google Project Zero found a memory + corruption (double free) vulnerability in the certificate + verification API. Any client or server application that verifies + X.509 certificates with GnuTLS 3.5.8 or later is affected.</li> + <li>It was found using the TLS fuzzer tools that decoding a + malformed TLS1.3 asynchronous message can cause a server crash + via an invalid pointer access. The issue affects GnuTLS server + applications since 3.6.4.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27</url> + <cvename>CVE-2019-3829</cvename> + <cvename>CVE-2019-3836</cvename> + </references> + <dates> + <discovery>2019-03-27</discovery> + <entry>2019-04-19</entry> + </dates> + </vuln> + <vuln vid="a64aa22f-61ec-11e9-85b9-a4badb296695"> <topic>dovecot -- json encoder crash</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201904191442.x3JEggQN043185>