Date: Tue, 25 Jul 2017 12:27:58 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r446577 - head/security/vuxml Message-ID: <201707251227.v6PCRwNd071730@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Tue Jul 25 12:27:58 2017 New Revision: 446577 URL: https://svnweb.freebsd.org/changeset/ports/446577 Log: Document gsoap vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jul 25 12:22:54 2017 (r446576) +++ head/security/vuxml/vuln.xml Tue Jul 25 12:27:58 2017 (r446577) @@ -58,6 +58,41 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8745c67e-7dd1-4165-96e2-fcf9da2dc5b5"> + <topic>gsoap -- remote code execution via via overflow</topic> + <affects> + <package> + <name>gsoap</name> + <range><lt>2.8.47</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Senrio reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/99868/discuss"> + <p>Genivia gSOAP is prone to a stack-based buffer-overflow + vulnerability because it fails to properly bounds check user-supplied + data before copying it into an insufficiently sized buffer.</p> + <p>A remote attacker may exploit this issue to execute arbitrary code + in the context of the affected device. Failed attempts will likely + cause a denial-of-service condition.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.securityfocus.com/bid/99868/discuss</url> + <url>http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions</url> + <url>http://blog.senr.io/devilsivy.html</url> + <url>https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29</url> + <url>https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29</url> + <cvename>CVE-2017-9765</cvename> + </references> + <dates> + <discovery>2017-07-18</discovery> + <entry>2017-07-25</entry> + </dates> + </vuln> + <vuln vid="92f4191a-6d25-11e7-93f7-d43d7e971a1b"> <topic>GitLab -- Various security issues</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707251227.v6PCRwNd071730>