svn commit: r387088 - head/security/vuxml
Xin LI
delphij at FreeBSD.org
Fri May 22 22:49:14 UTC 2015
Author: delphij
Date: Fri May 22 22:49:12 2015
New Revision: 387088
URL: https://svnweb.freebsd.org/changeset/ports/387088
Log:
Document PCRE and PHP multiple vulnerabilities.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri May 22 22:24:39 2015 (r387087)
+++ head/security/vuxml/vuln.xml Fri May 22 22:49:12 2015 (r387088)
@@ -57,6 +57,106 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4a88e3ed-00d3-11e5-a072-d050996490d0">
+ <topic>pcre -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>pcre</name>
+ <range><lt>8.37</lt></range>
+ </package>
+ <package>
+ <name>php5</name>
+ <range><lt>5.4.41</lt></range>
+ </package>
+ <package>
+ <name>php55</name>
+ <range><lt>5.5.25</lt></range>
+ </package>
+ <package>
+ <name>php56</name>
+ <range><lt>5.6.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PCRE development team reports:</p>
+ <blockquote cite="http://www.pcre.org/original/changelog.txt">
+ <p>A pattern such as "((?2){0,1999}())?", which has a group
+ containing a forward reference repeated a large (but limited)
+ number of times within a repeated outer group that has a zero
+ minimum quantifier, caused incorrect code to be compiled,
+ leading to the error "internal error: previously-checked
+ referenced subpattern not found" when an incorrect memory
+ address was read. This bug was reported as "heap overflow",
+ discovered by Kai Lu of Fortinet's FortiGuard Labs and given
+ the CVE number CVE-2015-2325.</p>
+ <p>A pattern such as "((?+1)(\1))/" containing a forward
+ reference subroutine call within a group that also contained
+ a recursive back reference caused incorrect code to be
+ compiled. This bug was reported as "heap overflow",
+ discovered by Kai Lu of Fortinet's FortiGuard Labs,
+ and given the CVE number CVE-2015-2326.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-2325</cvename>
+ <cvename>CVE-2015-2326</cvename>
+ <url>http://www.pcre.org/original/changelog.txt</url>
+ </references>
+ <dates>
+ <discovery>2015-04-28</discovery>
+ <entry>2015-05-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="31de2e13-00d2-11e5-a072-d050996490d0">
+ <topic>php -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>php5</name>
+ <range><lt>5.4.41</lt></range>
+ </package>
+ <package>
+ <name>php55</name>
+ <range><lt>5.5.25</lt></range>
+ </package>
+ <package>
+ <name>php56</name>
+ <range><lt>5.6.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PHP development team reports:</p>
+ <blockquote cite="https://php.net/ChangeLog-5.php#5.6.9">
+ <p>Fixed bug #69364 (PHP Multipart/form-data remote DoS
+ Vulnerability). (CVE-2015-4024)</p>
+ <p>Fixed bug #69418 (CVE-2006-7243 fix regressions in
+ 5.4+). (CVE-2015-4025)</p>
+ <p>Fixed bug #69545 (Integer overflow in ftp_genlist()
+ resulting in heap overflow). (CVE-2015-4022)</p>
+ <p>Fixed bug #68598 (pcntl_exec() should not allow null
+ char). (CVE-2015-4026)</p>
+ <p>Fixed bug #69453 (Memory Corruption in phar_parse_tarfile
+ when entry filename starts with null). (CVE-2015-4021)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-4021</cvename>
+ <cvename>CVE-2015-4022</cvename>
+ <cvename>CVE-2015-4024</cvename>
+ <cvename>CVE-2015-4025</cvename>
+ <cvename>CVE-2015-4026</cvename>
+ <url>https://php.net/ChangeLog-5.php#5.6.9</url>
+ </references>
+ <dates>
+ <discovery>2015-05-14</discovery>
+ <entry>2015-05-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fc38cd83-00b3-11e5-8ebd-0026551a22dc">
<topic>PostgreSQL -- minor security problems.</topic>
<affects>
More information about the svn-ports-all
mailing list