git: d0f01687dc3b - main - security/vuxml: Document OpenSSL low vulnerability

From: Bernard Spil <brnrd_at_FreeBSD.org>
Date: Sat, 19 Oct 2024 14:58:01 UTC
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=d0f01687dc3be5b25952ef4a4c9e12cc8dcb0c3f

commit d0f01687dc3be5b25952ef4a4c9e12cc8dcb0c3f
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2024-10-19 14:57:57 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2024-10-19 14:57:57 +0000

    security/vuxml: Document OpenSSL low vulnerability
---
 security/vuxml/vuln/2024.xml | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index ac304d0f7116..43d7593cabda 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,33 @@
+  <vuln vid="c6f4177c-8e29-11ef-98e7-84a93843eb75">
+    <topic>OpenSSL -- OOB memory access vulnerability</topic>
+    <affects>
+      <package>
+	<name>openssl</name>
+	<range><lt>3.0.15_1</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The OpenSSL project reports:</p>
+	<blockquote cite="https://openssl-library.org/news/secadv/20241016.txt">
+	  <p>Low-level invalid GF(2^m) parameters lead to OOB memory access
+	   (CVE-2024-9143) (Low)</p>
+	  <p> Use of the low-level GF(2^m) elliptic curve APIs with untrusted
+	    explicit values for the field polynomial can lead to out-of-bounds
+	    memory reads or writes.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-9143</cvename>
+      <url>https://openssl-library.org/news/secadv/20241016.txt</url>
+    </references>
+    <dates>
+      <discovery>2024-10-16</discovery>
+      <entry>2024-10-19</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="815bf172-ab9e-4c4b-9662-d18b0054330d">
     <topic>electron{31,32} -- multiple vulnerabilities</topic>
     <affects>