svn commit: r525501 - head/security/vuxml
Cy Schubert
cy at FreeBSD.org
Fri Feb 7 19:38:46 UTC 2020
Author: cy
Date: Fri Feb 7 19:38:45 2020
New Revision: 525501
URL: https://svnweb.freebsd.org/changeset/ports/525501
Log:
Document ksh93 CVE-2019-14868: certain environment variables interpreted
as arithmetic expressions on startup, leading to code injection.
Reported by: Siteshwar Vashisht <svashisht at redhat.com>
MFH: 2020Q1
Security: CVE-2019-14868
https://bugzilla.redhat.com/show_bug.cgi?id=1757324
https://access.redhat.com/security/cve/CVE-2019-14868
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Feb 7 19:38:40 2020 (r525500)
+++ head/security/vuxml/vuln.xml Fri Feb 7 19:38:45 2020 (r525501)
@@ -58,6 +58,42 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="8b20d716-49df-11ea-9f7b-206a8a720317">
+ <topic>ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection</topic>
+ <affects>
+ <package>
+ <name>ksh93</name>
+ <range><lt>2020.0.1_1,1</lt></range>
+ </package>
+ <package>
+ <name>ksh93-devel</name>
+ <range><lt>2020.02.07</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Upstream ksh93 maintainer Siteshwar Vashisht reports:</p>
+ <blockquote cite="https://access.redhat.com/security/cve/CVE-2019-14868">
+ <p>A flaw was found in the way ksh evaluates certain environment
+ variables. An attacker could use this flaw to override or bypass
+ environment restrictions to execute shell commands. Services and
+ applications that allow remote unauthenticated attackers to
+ provide one of those environment variables could allow them to
+ exploit this issue remotely.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=1757324</url>
+ <url>https://access.redhat.com/security/cve/CVE-2019-14868</url>
+ <url>https://access.redhat.com/errata/RHSA-2020:0431</url>
+ </references>
+ <dates>
+ <discovery>2019-10-01</discovery>
+ <entry>2020-02-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e7bc2b99-485a-11ea-bff9-9c5c8e75236a">
<topic>clamav -- Denial-of-Service (DoS) vulnerability</topic>
<affects>
More information about the svn-ports-head
mailing list