svn commit: r535226 - head/security/vuxml
Matthias Andree
mandree at FreeBSD.org
Thu May 14 11:29:21 UTC 2020
Author: mandree
Date: Thu May 14 11:29:19 2020
New Revision: 535226
URL: https://svnweb.freebsd.org/changeset/ports/535226
Log:
devel/json-c: CVE-2020-12762 integer overflow, out of bounds write
Reported by: Daniel Engberg
Security: abc3ef37-95d4-11ea-9004-25fadb81abf4
Security: CVE-2020-12762
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 14 11:29:18 2020 (r535225)
+++ head/security/vuxml/vuln.xml Thu May 14 11:29:19 2020 (r535226)
@@ -58,6 +58,38 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="abc3ef37-95d4-11ea-9004-25fadb81abf4">
+ <topic>json-c -- integer overflow and out-of-bounds write via a large JSON file</topic>
+ <affects>
+ <package>
+ <name>json-c</name>
+ <range><lt>0.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tobias Stöckmann reports:</p>
+ <blockquote cite="https://github.com/json-c/json-c/pull/592">
+ <p>
+ I have discovered a way to trigger an out of boundary write while
+ parsing a huge json file through a malicious input source. It can be
+ triggered if an attacker has control over the input stream or if a
+ huge load during filesystem operations can be triggered.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/json-c/json-c/pull/592</url>
+ <url>https://github.com/json-c/json-c/pull/599</url>
+ <cvename>CVE-2020-12762</cvename>
+ </references>
+ <dates>
+ <discovery>2020-05-02</discovery>
+ <entry>2020-05-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="59fabdf2-9549-11ea-9448-08002728f74c">
<topic>typo3 -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list