mirror of
https://git.freebsd.org/ports.git
synced 2025-07-18 17:59:20 -04:00
Document libbson issue
This commit is contained in:
parent
c8b97e8a3b
commit
939dc9d56a
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=450688
1 changed files with 29 additions and 0 deletions
|
@ -58,6 +58,35 @@ Notes:
|
|||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="10214bda-0902-4e3b-a2f9-9a68ef206a73">
|
||||
<topic>libbson -- Denial of Service</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>libbson</name>
|
||||
<range><lt>1.8.1</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>mongodb developers report:</p>
|
||||
<blockquote cite="http://www.securityfocus.com/bid/100825">
|
||||
<p>In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>http://www.securityfocus.com/bid/100825</url>
|
||||
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1489355</url>
|
||||
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1489356</url>
|
||||
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1489362</url>
|
||||
<cvename>CVE-2017-14227</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2017-9-9</discovery>
|
||||
<entry>2017-9-26</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="eb03d642-6724-472d-b038-f2bf074e1fc8">
|
||||
<topic>tcpdump -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Add table
Reference in a new issue