svn commit: r458288 - head/security/vuxml
Danilo G. Baio
dbaio at FreeBSD.org
Sat Jan 6 20:43:53 UTC 2018
Author: dbaio
Date: Sat Jan 6 20:43:51 2018
New Revision: 458288
URL: https://svnweb.freebsd.org/changeset/ports/458288
Log:
security/vuxml: Document multiple vulnerabilities in irc/irssi
Security: CVE-2018-5205
Security: CVE-2018-5206
Security: CVE-2018-5207
Security: CVE-2018-5208
PR: 224954
Reported by: tj at mrsk.me (email)
Reported by: David O'Rourke <dor.bsd at xm0.uk>
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Jan 6 19:32:43 2018 (r458287)
+++ head/security/vuxml/vuln.xml Sat Jan 6 20:43:51 2018 (r458288)
@@ -58,6 +58,44 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a3764767-f31e-11e7-95f2-005056925db4">
+ <topic>irssi -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>irssi</name>
+ <range><lt>1.0.6,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Irssi reports:</p>
+ <blockquote cite="https://irssi.org/security/irssi_sa_2018_01.txt">
+ <p>When the channel topic is set without specifying a sender, Irssi
+ may dereference NULL pointer. Found by Joseph Bisch.</p>
+ <p>When using incomplete escape codes, Irssi may access data beyond
+ the end of the string. Found by Joseph Bisch.</p>
+ <p>A calculation error in the completion code could cause a heap
+ buffer overflow when completing certain strings.
+ Found by Joseph Bisch.</p>
+ <p>When using an incomplete variable argument, Irssi may access data
+ beyond the end of the string. Found by Joseph Bisch.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://irssi.org/security/irssi_sa_2018_01.txt</url>
+ <cvename>CVE-2018-5205</cvename>
+ <cvename>CVE-2018-5206</cvename>
+ <cvename>CVE-2018-5207</cvename>
+ <cvename>CVE-2018-5208</cvename>
+ <freebsdpr>ports/224954</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2018-01-03</discovery>
+ <entry>2018-01-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="8429711b-76ca-474e-94a0-6b980f1e2d47">
<topic>mozilla -- Speculative execution side-channel attack</topic>
<affects>
More information about the svn-ports-head
mailing list