Skip to content

Commit

Permalink
security/vuxml: sync with upstream
Browse files Browse the repository at this point in the history
Taken from: FreeBSD
  • Loading branch information
fichtner committed Jan 2, 2024
1 parent 2e1d1bc commit 6cff6a6
Show file tree
Hide file tree
Showing 4 changed files with 64 additions and 5 deletions.
1 change: 1 addition & 0 deletions security/vuxml/files/tidy.xsl
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ result in more namespace declarations than we wish.
<!ENTITY vuln-2021 SYSTEM "vuln/2021.xml">
<!ENTITY vuln-2022 SYSTEM "vuln/2022.xml">
<!ENTITY vuln-2023 SYSTEM "vuln/2023.xml">
<!ENTITY vuln-2024 SYSTEM "vuln/2024.xml">
]>
]]></xsl:text>
<xsl:apply-templates />
Expand Down
4 changes: 3 additions & 1 deletion security/vuxml/vuln.xml
Original file line number Diff line number Diff line change
Expand Up @@ -21,9 +21,10 @@
<!ENTITY vuln-2021 SYSTEM "vuln/2021.xml">
<!ENTITY vuln-2022 SYSTEM "vuln/2022.xml">
<!ENTITY vuln-2023 SYSTEM "vuln/2023.xml">
<!ENTITY vuln-2024 SYSTEM "vuln/2024.xml">
]>
<!--
Copyright 2003-2023 Jacques Vidrine and contributors
Copyright 2003-2024 Jacques Vidrine and contributors
Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
HTML, PDF, PostScript, RTF and so forth) with or without modification,
Expand Down Expand Up @@ -79,6 +80,7 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
&vuln-2024;
&vuln-2023;
&vuln-2022;
&vuln-2021;
Expand Down
31 changes: 27 additions & 4 deletions security/vuxml/vuln/2023.xml
Original file line number Diff line number Diff line change
Expand Up @@ -76,9 +76,9 @@
<blockquote cite="https://github.com/go-gitea/gitea/pull/28423">
<p>Do some missing checks</p>
</blockquote>
<p>By crafting an API request, attackers can access the contents of
issues even though the logged-in user does not have access rights to
these issues.</p>
<p>By crafting an API request, attackers can access the contents of
issues even though the logged-in user does not have access rights to
these issues.</p>
</body>
</description>
<references>
Expand Down Expand Up @@ -475,6 +475,14 @@
<name>ungoogled-chromium</name>
<range><lt>120.0.6099.62</lt></range>
</package>
<package>
<name>qt5-webengine</name>
<range><lt>5.15.16.p5_2</lt></range>
</package>
<package>
<name>qt6-webengine</name>
<range><lt>6.6.1_1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
Expand Down Expand Up @@ -509,8 +517,10 @@
<topic>apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication</topic>
<affects>
<package>
<name>apache</name>
<name>zookeeper</name>
<range><lt>3.7.2</lt></range>
<range><ge>3.8.0</ge><lt>3.8.3</lt></range>
<range><ge>3.9.0</ge><lt>3.9.1</lt></range>
</package>
</affects>
<description>
Expand Down Expand Up @@ -786,6 +796,14 @@
<name>ungoogled-chromium</name>
<range><lt>119.0.6045.199</lt></range>
</package>
<package>
<name>qt5-webengine</name>
<range><lt>5.15.16.p5_2</lt></range>
</package>
<package>
<name>qt6-webengine</name>
<range><lt>6.6.1_1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
Expand Down Expand Up @@ -1004,6 +1022,10 @@
<name>openvpn</name>
<range><ge>2.6.0</ge><lt>2.6.7_1</lt></range>
</package>
<package>
<name>openvpn-devel</name>
<range><lt>g20231109,1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
Expand All @@ -1025,6 +1047,7 @@ Reported by Niccolo Belli and WIPocket (Github #400, #417).
<dates>
<discovery>2023-08-29</discovery>
<entry>2023-11-15</entry>
<modified>2023-12-31</modified>
</dates>
</vuln>

Expand Down
33 changes: 33 additions & 0 deletions security/vuxml/vuln/2024.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
<vuln vid="13d83980-9f18-11ee-8e38-002590c1f29c">
<topic>FreeBSD -- Prefix Truncation Attack in the SSH protocol</topic>
<affects>
<package>
<name>FreeBSD</name>
<range><ge>14.0</ge><lt>14.0_4</lt></range>
<range><ge>13.2</ge><lt>13.2_9</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<h1>Problem Description:</h1>
<p>The SSH protocol executes an initial handshake between the
server and the client. This protocol handshake includes the
possibility of several extensions allowing different options to be
selected. Validation of the packets in the handshake is done through
sequence numbers.</p>
<h1>Impact:</h1>
<p>A man in the middle attacker can silently manipulate handshake
messages to truncate extension negotiation messages potentially
leading to less secure client authentication algorithms or deactivating
keystroke timing attack countermeasures.</p>
</body>
</description>
<references>
<cvename>CVE-2023-48795</cvename>
<freebsdsa>SA-23:19.openssh</freebsdsa>
</references>
<dates>
<discovery>2023-12-19</discovery>
<entry>2024-01-02</entry>
</dates>
</vuln>

0 comments on commit 6cff6a6

Please sign in to comment.