git: 229c32e03ec3 - main - security/vuxml: Document vulnerability in www/varnish-libvmod-digest
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 12 Dec 2025 18:32:15 UTC
The branch main has been updated by zi:
URL: https://cgit.FreeBSD.org/ports/commit/?id=229c32e03ec3b209063c178a9a1a1026713c66f7
commit 229c32e03ec3b209063c178a9a1a1026713c66f7
Author: Ryan Steinmetz <zi@FreeBSD.org>
AuthorDate: 2025-12-12 18:32:10 +0000
Commit: Ryan Steinmetz <zi@FreeBSD.org>
CommitDate: 2025-12-12 18:32:10 +0000
security/vuxml: Document vulnerability in www/varnish-libvmod-digest
---
security/vuxml/vuln/2025.xml | 32 ++++++++++++++++++++++++++++++++
1 file changed, 32 insertions(+)
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 66287a503559..0d88ccdd6f35 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,35 @@
+ <vuln vid="64bec4c7-d785-11f0-a1c0-0050569f0b83">
+ <topic>www/varnish-libvmod-digest -- base64 decoding vulnerability</topic>
+ <affects>
+ <package>
+ <name>varnish-libvmod-digest</name>
+ <range><lt>1.0.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>varnish developers report:</p>
+ <blockquote cite="https://vinyl-cache.org/security/VSV00012.html">
+ <p>Common usage of vmod-digest is for basic HTTP authentication, in
+ which case it may be possible for an attacker to circumvent the
+ authentication check. If the decoded result string is somehow
+ being made visible to the attacker (for example the result of
+ the decoding is added to a response header), then there is the
+ potential for information disclosure from reading out of band
+ workspace data.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-41104</cvename>
+ <url>https://vinyl-cache.org/security/VSV00012.html</url>
+ </references>
+ <dates>
+ <discovery>2023-08-17</discovery>
+ <entry>2025-12-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2956aba3-1fcb-4c39-9cea-d88a46a3bf93">
<topic>jenkins -- multiple vulnerabilities</topic>
<affects>