svn commit: r454765 - head/security/vuxml
Ben Woods
woodsb02 at FreeBSD.org
Thu Nov 23 15:06:27 UTC 2017
Author: woodsb02
Date: Thu Nov 23 15:06:25 2017
New Revision: 454765
URL: https://svnweb.freebsd.org/changeset/ports/454765
Log:
Document multiple vulnerabilities in sysutils/py-salt
Security: CVE-2017-14695
Security: CVE-2017-14696
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Nov 23 14:11:32 2017 (r454764)
+++ head/security/vuxml/vuln.xml Thu Nov 23 15:06:25 2017 (r454765)
@@ -58,6 +58,49 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="50127e44-7b88-4ade-8e12-5d57320823f1">
+ <topic>salt -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py27-salt</name>
+ <name>py32-salt</name>
+ <name>py33-salt</name>
+ <name>py34-salt</name>
+ <name>py35-salt</name>
+ <name>py36-salt</name>
+ <range><lt>2016.11.8</lt></range>
+ <range><ge>2017.7.0</ge><lt>2017.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SaltStack reports:</p>
+ <blockquote cite="https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html">
+ <p>Directory traversal vulnerability in minion id validation in SaltStack.
+ Allows remote minions with incorrect credentials to authenticate to a
+ master via a crafted minion ID. Credit for discovering the security flaw
+ goes to: Julian Brost (julian at 0x4a42.net). NOTE: this vulnerability exists
+ because of an incomplete fix for CVE-2017-12791.</p>
+ <p>Remote Denial of Service with a specially crafted authentication request.
+ Credit for discovering the security flaw goes to: Julian Brost
+ (julian at 0x4a42.net)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-14695</cvename>
+ <cvename>CVE-2017-14696</cvename>
+ <url>https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html</url>
+ <url>https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.8.html</url>
+ <url>https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d</url>
+ <url>https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b</url>
+ </references>
+ <dates>
+ <discovery>2017-10-09</discovery>
+ <entry>2017-11-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ef3423e4-d056-11e7-a52c-002590263bf5">
<topic>codeigniter -- input validation bypass</topic>
<affects>
More information about the svn-ports-all
mailing list