diff options
author | delphij <delphij@FreeBSD.org> | 2010-07-07 05:39:09 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2010-07-07 05:39:09 +0800 |
commit | be843a931c85e1f94d19b1e38ed2946097d297ab (patch) | |
tree | 3d17aa091bddbf79542ca36175e8a7f9b1430f45 /security | |
parent | 200898e51012a4d966bd47551d614f1bc70450a8 (diff) | |
download | freebsd-ports-gnome-be843a931c85e1f94d19b1e38ed2946097d297ab.tar.gz freebsd-ports-gnome-be843a931c85e1f94d19b1e38ed2946097d297ab.tar.zst freebsd-ports-gnome-be843a931c85e1f94d19b1e38ed2946097d297ab.zip |
Add bogofilter heap underrun on malformed base64 input.
Submitted by: mandree
PR: ports/148408
Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 42 |
1 files changed, 40 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 986166943b8a..66660f8c551d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="25ed4ff8-8940-11df-a339-0026189baca3"> + <topic>bogofilter -- heap underrun on malformed base64 input</topic> + <affects> + <package> + <name>bogofilter</name> + <range><lt>1.2.1_2</lt></range> + </package> + <package> + <name>bogofilter-sqlite</name> + <range><lt>1.2.1_1</lt></range> + </package> + <package> + <name>bogofilter-tc</name> + <range><lt>1.2.1_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Julius Plenz reports:</p> + <blockquote cite="http://www.bogofilter.org/pipermail/bogofilter-dev/2010-June/003475.html"> + <p>I found a bug in the base64_decode function which may cause memory + corruption when the function is executed on a malformed base64 + encoded string.</p> + <p>If a string starting with an equal-sign is passed to the + base64_decode function it triggers a memory corruption that + in some cases makes bogofilter crash.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2010-2494</cvename> + <url>http://bogofilter.sourceforge.net/security/bogofilter-SA-2010-01</url> + </references> + <dates> + <discovery>2010-06-28</discovery> + <entry>2010-07-06</entry> + </dates> + </vuln> + <vuln vid="f1331504-8849-11df-89b8-00151735203a"> <topic>bugzilla -- information disclosure</topic> <affects> @@ -185,8 +224,7 @@ Note: Please add new entries to the beginning of this file. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Juli Mallett reports:</p> - <blockquote - cite="http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/147007"> + <blockquote cite="http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/147007"> <p>mdnsd will crash on some systems with a corrupt stack and once that's fixed it will still leak a file descriptor when parsing resolv.conf. The crash is because scanf is used with %10s for a |