aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsunpoet <sunpoet@FreeBSD.org>2017-09-25 03:08:19 +0800
committersunpoet <sunpoet@FreeBSD.org>2017-09-25 03:08:19 +0800
commit1a91dbe387a1d72be17b0e23df37e35e962ef09e (patch)
tree42cdbfaf7acbb0c9f6519ec7abc4e3506852c4a4 /security
parentb29c9e916bfb8a08e69671a705573c5738314585 (diff)
downloadfreebsd-ports-gnome-1a91dbe387a1d72be17b0e23df37e35e962ef09e.tar.gz
freebsd-ports-gnome-1a91dbe387a1d72be17b0e23df37e35e962ef09e.tar.zst
freebsd-ports-gnome-1a91dbe387a1d72be17b0e23df37e35e962ef09e.zip
Document Perl vulnerability
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c78f4ba5a1e6..9050f3b3d809 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,46 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d9e82328-a129-11e7-987e-4f174049b30a">
+ <topic>perl -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>perl5</name>
+ <range><ge>5.24.0</ge><lt>5.24.3</lt></range>
+ <range><ge>5.26.0</ge><lt>5.26.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="https://metacpan.org/changes/release/SHAY/perl-5.26.1#Security">
+ <p>CVE-2017-12814: $ENV{$key} stack buffer overflow on Windows</p>
+ <p>A possible stack buffer overflow in the %ENV code on Windows has been
+ fixed by removing the buffer completely since it was superfluous anyway.</p>
+ <p>CVE-2017-12837: Heap buffer overflow in regular expression compiler</p>
+ <p>Compiling certain regular expression patterns with the case-insensitive
+ modifier could cause a heap buffer overflow and crash perl. This has now
+ been fixed.</p>
+ <p>CVE-2017-12883: Buffer over-read in regular expression parser</p>
+ <p>For certain types of syntax error in a regular expression pattern, the
+ error message could either contain the contents of a random, possibly
+ large, chunk of memory, or could crash perl. This has now been fixed.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://metacpan.org/changes/release/SHAY/perl-5.24.3</url>
+ <url>https://metacpan.org/changes/release/SHAY/perl-5.26.1</url>
+ <cvename>CVE-2017-12814</cvename>
+ <cvename>CVE-2017-12837</cvename>
+ <cvename>CVE-2017-12883</cvename>
+ </references>
+ <dates>
+ <discovery>2017-09-19</discovery>
+ <entry>2017-09-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="917e5519-9fdd-11e7-8b58-e8e0b747a45a">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>