FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
71ad81da-4414-11e4-a33e-3c970e169bc2bash -- remote code execution vulnerability

Chet Ramey reports:

Under certain circumstances, bash will execute user code while processing the environment for exported function definitions.

The original fix released for CVE-2014-6271 was not adequate. A similar vulnerability was discovered and tagged as CVE-2014-7169.


Discovery 2014-09-24
Entry 2014-09-24
Modified 2014-09-25
bash
bash-static
gt 3.0 le 3.0.17

gt 3.1 le 3.1.18

gt 3.2 le 3.2.52

gt 4.0 le 4.0.39

gt 4.1 le 4.1.12

gt 4.2 le 4.2.48

gt 4.3 lt 4.3.25_1

linux_base-c6
< 6.5_1

CVE-2014-6271
CVE-2014-7169
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
https://lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html
http://seclists.org/oss-sec/2014/q3/690
0765de84-a6c1-11e4-a0c1-c485083ca99cglibc -- gethostbyname buffer overflow

Robert Krátký reports:

GHOST is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application. The gethostbyname() function calls are used for DNS resolving, which is a very common event. To exploit this vulnerability, an attacker must trigger a buffer overflow by supplying an invalid hostname argument to an application that performs a DNS resolution.


Discovery 2015-01-27
Entry 2015-01-28
Modified 2015-02-02
linux_base-c6
< 6.6_2

linux_base-f10
ge 0

linux-c6-devtools
< 6.6_3

linux-f10-devtools
ge 0

CVE-2015-0235
https://access.redhat.com/articles/1332213
http://www.openwall.com/lists/oss-security/2015/01/27/9
2dd7e97e-d5e8-11e5-bcbd-bc5ff45d0f28glibc -- getaddrinfo stack-based buffer overflow

Fabio Olive Leite reports:

A stack-based buffer overflow was found in libresolv when invoked from nss_dns, allowing specially crafted DNS responses to seize control of EIP in the DNS client. The buffer overflow occurs in the functions send_dg (send datagram) and send_vc (send TCP) for the NSS module libnss_dns.so.2 when calling getaddrinfo with AF_UNSPEC family, or in some cases AF_INET6 family. The use of AF_UNSPEC (or AF_INET6 in some cases) triggers the low-level resolver code to send out two parallel queries for A and AAAA. A mismanagement of the buffers used for those queries could result in the response of a query writing beyond the alloca allocated buffer created by __res_nquery.


Discovery 2016-02-16
Entry 2016-02-18
linux_base-c6
linux_base-c6_64
< 6.7_1

linux_base-f10
ge 0

CVE-2015-7547
ports/207272
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7547
https://blog.des.no/2016/02/freebsd-and-cve-2015-7547/
https://googleonlinesecurity.blogspot.no/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html