svn commit: r568503 - head/security/vuxml
Chris Rees
crees at FreeBSD.org
Mon Mar 15 20:16:34 UTC 2021
Author: crees
Date: Mon Mar 15 20:16:33 2021
New Revision: 568503
URL: https://svnweb.freebsd.org/changeset/ports/568503
Log:
Document CVE-2015-4645 in sysutils/squashfs-tools
Security: CVE-2015-4645
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Mar 15 20:11:39 2021 (r568502)
+++ head/security/vuxml/vuln.xml Mon Mar 15 20:16:33 2021 (r568503)
@@ -78,6 +78,32 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="317487c6-85ca-11eb-80fa-14dae938ec40">
+ <topic>squashfs-tools -- Integer overflow</topic>
+ <affects>
+ <package>
+ <name>squashfs-tools</name>
+ <range><lt>4.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Phillip Lougher reports:</p>
+ <blockquote cite="https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1">
+ <p>Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-4645</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2015-4645</url>
+ </references>
+ <dates>
+ <discovery>2017-03-17</discovery>
+ <entry>2021-03-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="72709326-81f7-11eb-950a-00155d646401">
<topic>go -- encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader; archive/zip: panic when calling Reader.Open</topic>
<affects>
More information about the svn-ports-head
mailing list