diff options
author | feld <feld@FreeBSD.org> | 2017-12-02 21:27:26 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2017-12-02 21:27:26 +0800 |
commit | 445fc061b944079732625f6769b087eb3f223e9a (patch) | |
tree | 1364ab776fb41e29c5c6ba3df880de93aaf6852f | |
parent | 78635d63a465d5a6230603e4a916c26f8c7b8769 (diff) | |
download | freebsd-ports-gnome-445fc061b944079732625f6769b087eb3f223e9a.tar.gz freebsd-ports-gnome-445fc061b944079732625f6769b087eb3f223e9a.tar.zst freebsd-ports-gnome-445fc061b944079732625f6769b087eb3f223e9a.zip |
Document varnish vulnerabilty
Security: CVE-2017-8807
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ccce20950e5a..c0948db9f20d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="17133e7e-d764-11e7-b5af-a4badb2f4699"> + <topic>varnish -- information disclosure vulnerability</topic> + <affects> + <package> + <name>varnish4</name> + <range><lt>4.1.9</lt></range> + </package> + <package> + <name>varnish5</name> + <range><lt>5.2.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Varnish reports:</p> + <blockquote cite="https://varnish-cache.org/security/VSV00002.html"> + <p>A wrong if statement in the varnishd source code means that + synthetic objects in stevedores which over-allocate, may leak up to page + size of data from a malloc(3) memory allocation.</p> + </blockquote> + </body> + </description> + <references> + <url>https://varnish-cache.org/security/VSV00002.html</url> + <cvename>CVE-2017-8807</cvename> + </references> + <dates> + <discovery>2017-11-15</discovery> + <entry>2017-12-02</entry> + </dates> + </vuln> + <vuln vid="addad6de-d752-11e7-99bf-00e04c1ea73d"> <topic>mybb -- multiple vulnerabilities</topic> <affects> |