svn commit: r525451 - head/security/vuxml
Kurt Jaeger
pi at FreeBSD.org
Thu Feb 6 21:02:19 UTC 2020
Author: pi
Date: Thu Feb 6 21:02:18 2020
New Revision: 525451
URL: https://svnweb.freebsd.org/changeset/ports/525451
Log:
security/vuxml: Document Denial-of-Service vulnerability in ClamAV
- CVE-2020-3123
PR: 243913
Submitted by: Yasuhiro KIMURA <yasu at utahime.org>
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Feb 6 20:59:17 2020 (r525450)
+++ head/security/vuxml/vuln.xml Thu Feb 6 21:02:18 2020 (r525451)
@@ -58,6 +58,35 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e7bc2b99-485a-11ea-bff9-9c5c8e75236a">
+ <topic>clamav -- Denial-of-Service (DoS) vulnerability</topic>
+ <affects>
+ <package>
+ <name>clamav</name>
+ <range><lt>0.102.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Micah Snyder reports:</p>
+ <blockquote cite="https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html">
+ <p>A denial-of-service (DoS) condition may occur when using the optional
+ credit card data-loss-prevention (DLP) feature. Improper bounds checking of
+ an unsigned variable resulted in an out-of-bounds read, which causes a crash.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html</url>
+ <cvename>CVE-2020-3123</cvename>
+ </references>
+ <dates>
+ <discovery>2020-02-05</discovery>
+ <entry>2020-02-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5a45649a-4777-11ea-bdec-08002728f74c">
<topic>Django -- potential SQL injection vulnerability</topic>
<affects>
More information about the svn-ports-all
mailing list