aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoreugen <eugen@FreeBSD.org>2018-07-15 23:13:15 +0800
committereugen <eugen@FreeBSD.org>2018-07-15 23:13:15 +0800
commitcc4d7b90c89f4d3c0de88af59ab8ca02edebb5ee (patch)
treec310007632bfca194d8607ad6095e142e75f1d76
parentd2b23f8ad3c9aeb3be3972b7d9ad1961b48bc24e (diff)
downloadfreebsd-ports-gnome-cc4d7b90c89f4d3c0de88af59ab8ca02edebb5ee.tar.gz
freebsd-ports-gnome-cc4d7b90c89f4d3c0de88af59ab8ca02edebb5ee.tar.zst
freebsd-ports-gnome-cc4d7b90c89f4d3c0de88af59ab8ca02edebb5ee.zip
Document several security defects in the Bouncy Castle Crypto APIs
before version 1.60 Obtained from: https://www.bouncycastle.org/latest_releases.html Security: https://vuxml.FreeBSD.org/freebsd/fe93803c-883f-11e8-9f0c-001b216d295b
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1eeb2bac16cc..11c6153ee4ca 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,37 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="fe93803c-883f-11e8-9f0c-001b216d295b">
+ <topic>Several Security Defects in the Bouncy Castle Crypto APIs</topic>
+ <affects>
+ <package>
+ <name>bouncycastle15</name>
+ <range><lt>1.60</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Legion of the Bouncy Castle reports:</p>
+ <blockquote cite="https://www.bouncycastle.org/latest_releases.html">
+ <p>Release 1.60 is now available for download.</p>
+ <p>CVE-2018-1000180: issue around primality tests for RSA key pair
+ generation if done using only the low-level API.</p>
+ <p>CVE-2018-1000613: lack of class checking in deserialization
+ of XMSS/XMSS^MT private keys with BDS state information.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-1000180</cvename>
+ <cvename>CVE-2018-1000613</cvename>
+ <url>https://www.bouncycastle.org/latest_releases.html</url>
+ </references>
+ <dates>
+ <discovery>2018-06-30</discovery>
+ <entry>2018-07-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bd6cf187-8710-11e8-833d-18a6f7016652">
<topic>qutebrowser -- Remote code execution due to CSRF</topic>
<affects>