svn commit: r511427 - head/security/vuxml
Matthias Andree
mandree at FreeBSD.org
Sat Sep 7 21:07:46 UTC 2019
Author: mandree
Date: Sat Sep 7 21:07:44 2019
New Revision: 511427
URL: https://svnweb.freebsd.org/changeset/ports/511427
Log:
Document devel/oniguruma < 6.9.3 vulnerabilities.
PR: 240368
Reported by: Pascal Christen
Obtained from: MITRE
Security: a8d87c7a-d1b1-11e9-a616-0992a4564e7c
Security: CVE-2019-13224
Security: CVE-2019-13225
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Sep 7 20:53:37 2019 (r511426)
+++ head/security/vuxml/vuln.xml Sat Sep 7 21:07:44 2019 (r511427)
@@ -58,6 +58,41 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a8d87c7a-d1b1-11e9-a616-0992a4564e7c">
+ <topic>oniguruma -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>oniguruma</name>
+ <range><lt>6.9.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224">
+ <p>
+ A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe().
+ </p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225">
+ <p>A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression.</p>
+ <p>Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-13224</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224</url>
+ <url>https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55</url>
+ <cvename>CVE-2019-13225</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225</url>
+ <url>https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c</url>
+ </references>
+ <dates>
+ <discovery>2019-07-03</discovery>
+ <entry>2019-09-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="10e1d580-d174-11e9-a87f-a4badb2f4699">
<topic>xymon-server -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list