diff options
author | feld <feld@FreeBSD.org> | 2015-09-17 04:21:09 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2015-09-17 04:21:09 +0800 |
commit | 80f17b773d9bba17a1eddbc0cbe30aed3011ce90 (patch) | |
tree | 765778f8b7b83bb2043340bc2605425802ec927a /security | |
parent | 2558f8d8455b6a709567f5245095f051d9eb3f33 (diff) | |
download | freebsd-ports-gnome-80f17b773d9bba17a1eddbc0cbe30aed3011ce90.tar.gz freebsd-ports-gnome-80f17b773d9bba17a1eddbc0cbe30aed3011ce90.tar.zst freebsd-ports-gnome-80f17b773d9bba17a1eddbc0cbe30aed3011ce90.zip |
Document archivers/p7zip vulnerability
Security: CVE-2015-1038
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5136311755a8..ba73235f9e7d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8f5c9dd6-5cac-11e5-9ad8-14dae9d210b8"> + <topic>p7zip -- directory traversal vulnerability</topic> + <affects> + <package> + <name>p7zip</name> + <range><lt>9.38.1_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Alexander Cherepanov reports:</p> + <blockquote cite="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774660"> + <p>7z (and 7zr) is susceptible to a directory traversal vulnerability. + While extracting an archive, it will extract symlinks and then follow + them if they are referenced in further entries. This can be exploited by + a rogue archive to write files outside the current directory.</p> + </blockquote> + </body> + </description> + <references> + <url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774660</url> + <url>http://www.openwall.com/lists/oss-security/2015/01/11/2</url> + <url>http://sourceforge.net/p/p7zip/bugs/147/</url> + <cvename>CVE-2015-1038</cvename> + </references> + <dates> + <discovery>2015-01-05</discovery> + <entry>2015-09-16</entry> + </dates> + </vuln> + <vuln vid="31ea7f73-5c55-11e5-8607-74d02b9a84d5"> <topic>h2o -- directory traversal vulnerability</topic> <affects> |