From owner-svn-ports-all@freebsd.org Mon Jul 9 08:19:47 2018 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6EDC5102E6E3; Mon, 9 Jul 2018 08:19:47 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1C8BD8A1B9; Mon, 9 Jul 2018 08:19:47 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id F1D9612729; Mon, 9 Jul 2018 08:19:46 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id w698Jk7V051968; Mon, 9 Jul 2018 08:19:46 GMT (envelope-from miwi@FreeBSD.org) Received: (from miwi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id w698JkZ1051967; Mon, 9 Jul 2018 08:19:46 GMT (envelope-from miwi@FreeBSD.org) Message-Id: <201807090819.w698JkZ1051967@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: miwi set sender to miwi@FreeBSD.org using -f From: Martin Wilke Date: Mon, 9 Jul 2018 08:19:46 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r474238 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: miwi X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 474238 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Jul 2018 08:19:47 -0000 Author: miwi Date: Mon Jul 9 08:19:46 2018 New Revision: 474238 URL: https://svnweb.freebsd.org/changeset/ports/474238 Log: - Document devel/zziplib - multible vulnerabilities PR: 226491 Sponsored by: iXsystems Inc. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Jul 9 08:09:48 2018 (r474237) +++ head/security/vuxml/vuln.xml Mon Jul 9 08:19:46 2018 (r474238) @@ -58,6 +58,77 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + zziplib - multiple vulnerabilities + + + zziplib + 0.13.68 + + + + +

NIST reports (by search in the range 2017/01/01 - 2018/07/06):

+
+

17 security fixes in this release:

+
    +
  • Heap-based buffer overflow in the __zzip_get32 function in fetch.c.
  • +
  • Heap-based buffer overflow in the __zzip_get64 function in fetch.c.
  • +
  • Heap-based buffer overflow in the zzip_mem_entry_extra_block function + in memdisk.c.
  • +
  • The zzip_mem_entry_new function in memdisk.c allows remote attackers + to cause a denial of service (out-of-bounds read and crash) via a + crafted ZIP file.
  • +
  • The prescan_entry function in fseeko.c allows remote attackers to cause + a denial of service (NULL pointer dereference and crash) via crafted + ZIP file.
  • +
  • The zzip_mem_entry_new function in memdisk.c cause a NULL pointer + dereference and crash via a crafted ZIP file.
  • +
  • seeko.c cause a denial of service (assertion failure and crash) via a + crafted ZIP file.
  • +
  • A segmentation fault caused by invalid memory access in the + zzip_disk_fread function because the size variable is not validated + against the amount of file->stored data.
  • +
  • A memory alignment error and bus error in the __zzip_fetch_disk_trailer + function of zzip/zip.c.
  • +
  • A bus error caused by loading of a misaligned address in the + zzip_disk_findfirst function.
  • +
  • An uncontrolled memory allocation and a crash in the __zzip_parse_root_directory + function.
  • +
  • An invalid memory address dereference was discovered in zzip_disk_fread + in mmapped.c.
  • +
  • A memory leak triggered in the function zzip_mem_disk_new in + memdisk.c.
  • +
+
+ +
+ + CVE-2017-5974 + CVE-2017-5975 + CVE-2017-5976 + CVE-2017-5977 + CVE-2017-5978 + CVE-2017-5979 + CVE-2017-5980 + CVE-2017-5981 + CVE-2018-6381 + CVE-2018-6484 + CVE-2018-6540 + CVE-2018-6541 + CVE-2018-6542 + CVE-2018-6869 + CVE-2018-7725 + CVE-2018-7726 + CVE-2018-7727 + https://nvd.nist.gov/vuln/search/results?form_type=Advanced&results_type=overview&query=zziplib&search_type=all&pub_start_date=01%2F01%2F2017&pub_end_date=07%2F06%2F2018" + + + 2017-03-01 + 2018-07-06 + +
+ wordpress -- multiple issues