aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjunovitch <junovitch@FreeBSD.org>2016-05-04 07:57:03 +0800
committerjunovitch <junovitch@FreeBSD.org>2016-05-04 07:57:03 +0800
commit102598aafa3f323eebcaaa49894e9af2e5b9520d (patch)
tree617747601ddbadbfe09312a206bf41280ba1cfab /security
parentc2bc329c3ff101d3a12b5e2fcac2e32368b46bb8 (diff)
downloadfreebsd-ports-gnome-102598aafa3f323eebcaaa49894e9af2e5b9520d.tar.gz
freebsd-ports-gnome-102598aafa3f323eebcaaa49894e9af2e5b9520d.tar.zst
freebsd-ports-gnome-102598aafa3f323eebcaaa49894e9af2e5b9520d.zip
Fix <url> -> <cvename> tags in OpenSSL entry plus spacing fixes.
While here, combine both entries as they both refer to the same CVEs and we've typically done these as combined entries in the past.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml66
1 files changed, 22 insertions, 44 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index dc48e31f305a..cf90272ada9a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -59,44 +59,6 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="01d729ca-1143-11e6-b55e-b499baebfeaf">
- <topic>LibreSSL -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>libressl</name>
- <range><lt>2.3.4</lt></range>
- </package>
- <package>
- <name>libressl-devel</name>
- <range><lt>2.3.4</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>OpenBSD reports:</p>
- <blockquote cite="https://marc.info/?l=openbsd-tech&amp;m=146228598730414">
- <p>Memory corruption in the ASN.1 encoder</p>
- <p>Padding oracle in AES-NI CBC MAC check</p>
- <p>EVP_EncodeUpdate overflow</p>
- <p>EVP_EncryptUpdate overflow</p>
- <p>ASN.1 BIO excessive memory allocation</p>
- </blockquote>
- </body>
- </description>
- <references>
- <url>https://marc.info/?l=openbsd-tech&amp;m=146228598730414</url>
- <url>CVE-2016-2108</url>
- <url>CVE-2016-2107</url>
- <url>CVE-2016-2105</url>
- <url>CVE-2016-2106</url>
- <url>CVE-2016-2109</url>
- </references>
- <dates>
- <discovery>2016-05-03</discovery>
- <entry>2016-05-03</entry>
- </dates>
- </vuln>
-
- <vuln vid="95564990-1138-11e6-b55e-b499baebfeaf">
<topic>OpenSSL -- multiple vulnerabilities</topic>
<affects>
<package>
@@ -107,33 +69,49 @@ Notes:
<name>linux-c6-openssl</name>
<range><lt>1.0.1e_8</lt></range>
</package>
+ <package>
+ <name>libressl</name>
+ <range><lt>2.3.4</lt></range>
+ </package>
+ <package>
+ <name>libressl-devel</name>
+ <range><lt>2.3.4</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>OpenSSL reports:</p>
<blockquote cite="https://www.openssl.org/news/secadv/20160503.txt">
+ <p>Memory corruption in the ASN.1 encoder</p>
<p>Padding oracle in AES-NI CBC MAC check</p>
<p>EVP_EncodeUpdate overflow</p>
<p>EVP_EncryptUpdate overflow</p>
<p>ASN.1 BIO excessive memory allocation</p>
- <p>EBCDIC overread</p>
+ <p>EBCDIC overread (OpenSSL only)</p>
</blockquote>
</body>
</description>
<references>
<url>https://www.openssl.org/news/secadv/20160503.txt</url>
- <url>CVE-2016-2107</url>
- <url>CVE-2016-2105</url>
- <url>CVE-2016-2106</url>
- <url>CVE-2016-2109</url>
- <url>CVE-2016-2176</url>
+ <url>https://marc.info/?l=openbsd-tech&amp;m=146228598730414</url>
+ <cvename>CVE-2016-2105</cvename>
+ <cvename>CVE-2016-2106</cvename>
+ <cvename>CVE-2016-2107</cvename>
+ <cvename>CVE-2016-2108</cvename>
+ <cvename>CVE-2016-2109</cvename>
+ <cvename>CVE-2016-2176</cvename>
</references>
<dates>
<discovery>2016-05-03</discovery>
<entry>2016-05-03</entry>
+ <modified>2016-05-03</modified>
</dates>
</vuln>
+ <vuln vid="95564990-1138-11e6-b55e-b499baebfeaf">
+ <cancelled superseded="01d729ca-1143-11e6-b55e-b499baebfeaf"/>
+ </vuln>
+
<vuln vid="be72e773-1131-11e6-94fa-002590263bf5">
<topic>gitlab -- privilege escalation via "impersonate" feature</topic>
<affects>