Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Feb 2018 09:14:43 +0000 (UTC)
From:      Thomas Zander <riggs@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r462782 - head/security/vuxml
Message-ID:  <201802240914.w1O9EiVo037943@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: riggs
Date: Sat Feb 24 09:14:43 2018
New Revision: 462782
URL: https://svnweb.freebsd.org/changeset/ports/462782

Log:
  Document ssh injection vulnerability in devel/cvs
  
  PR:		226088
  Reported by:	fk@fabiankeil.de
  Security:	CVE-2017-12836

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Feb 24 09:07:58 2018	(r462781)
+++ head/security/vuxml/vuln.xml	Sat Feb 24 09:14:43 2018	(r462782)
@@ -58,6 +58,40 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="d9fe59ea-1940-11e8-9eb8-5404a68ad561">
+    <topic>cvs -- Remote code execution via ssh command injection</topic>
+    <affects>
+      <package>
+	<name>cvs</name>
+	<range><lt>1.20120905_5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Hank Leininger reports:</p>
+	<blockquote cite="http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html">;
+	  <p>Bugs in Git, Subversion, and Mercurial were just announced and patched
+	     which allowed arbitrary local command execution if a malicious name was
+	     used for the remote server, such as starting with - to pass options to
+	     the ssh client:
+	     git clone ssh://-oProxyCommand=some-command...
+	     CVS has a similar problem with the -d option:</p>
+	  <p>Tested vanilla CVS 1.12.13, and Gentoo CVS 1.12.12-r11.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html</url>;
+      <url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871810#10</url>;
+      <cvename>CVE-2017-12836</cvename>
+      <freebsdpr>ports/226088</freebsdpr>
+    </references>
+    <dates>
+      <discovery>2017-08-10</discovery>
+      <entry>2018-02-24</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="289269f1-0def-11e8-99b0-d017c2987f9a">
     <topic>LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201802240914.w1O9EiVo037943>