FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  496547
Date:      2019-03-22
Time:      04:08:55Z
Committer: zeising

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
2b4c8e1f-1609-11e6-b55e-b499baebfeaflibarchive -- RCE vulnerability

The libarchive project reports:

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.


Discovery 2016-05-01
Entry 2016-05-09
Modified 2016-05-10
libarchive
lt 3.2.0,1

CVE-2016-1541
https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
7c63775e-be31-11e5-b5fe-002590263bf5libarchive -- multiple vulnerabilities

MITRE reports:

Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.

Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.

Libarchive issue tracker reports:

Using a crafted tar file bsdtar can perform an out-of-bounds memory read which will lead to a SEGFAULT. The issue exists when the executable skips data in the archive. The amount of data to skip is defined in byte offset [16-19] If ASLR is disabled, the issue can lead to an infinite loop.


Discovery 2012-12-06
Entry 2016-01-18
Modified 2016-08-09
libarchive
lt 3.1.2_5,1

FreeBSD
ge 10.3 lt 10.3_4

ge 10.2 lt 10.2_18

ge 10.1 lt 10.1_35

ge 9.3 lt 9.3_43

CVE-2013-0211
CVE-2015-2304
ports/200176
SA-16:22.libarchive
SA-16:23.libarchive
https://github.com/libarchive/libarchive/pull/110
https://github.com/libarchive/libarchive/commit/5935715
https://github.com/libarchive/libarchive/commit/2253154
https://github.com/libarchive/libarchive/issues/502
https://github.com/libarchive/libarchive/commit/3865cf2
https://github.com/libarchive/libarchive/commit/e6c9668
https://github.com/libarchive/libarchive/commit/24f5de6
4a0d9b53-395d-11e6-b3c8-14dae9d210b8libarchive -- multiple vulnerabilities

Hanno Bock and Cisco Talos report:

  • Out of bounds heap read in RAR parser

  • Signed integer overflow in ISO parser

  • TALOS-2016-0152 [CVE-2016-4300]: 7-Zip read_SubStreamsInfo Integer Overflow

  • TALOS-2016-0153 [CVE-2016-4301]: mtree parse_device Stack Based Buffer Overflow

  • TALOS-2016-0154 [CVE-2016-4302]: Libarchive Rar RestartModel Heap Overflow


Discovery 2016-06-23
Entry 2016-06-23
libarchive
lt 3.2.1,1

http://openwall.com/lists/oss-security/2016/06/23/6
https://github.com/libarchive/libarchive/issues/521
https://github.com/libarchive/libarchive/issues/717#event-697151157
http://blog.talosintel.com/2016/06/the-poisoned-archives.html
CVE-2015-8934
CVE-2016-4300
CVE-2016-4301
CVE-2016-4302