FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-02 10:37:19 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68
These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
482d40cb-f9a3-11e5-92ce-002590263bf5 | php -- multiple vulnerabilities
The PHP Group reports:
- Fileinfo:
- Fixed bug #71527 (Buffer over-write in finfo_open with
malformed magic file).
- mbstring:
- Fixed bug #71906 (AddressSanitizer: negative-size-param (-1)
in mbfl_strcut).
- Phar:
- Fixed bug #71860 (Invalid memory write in phar on filename with
\0 in name).
- SNMP:
- Fixed bug #71704 (php_snmp_error() Format String Vulnerability).
- Standard:
- Fixed bug #71798 (Integer Overflow in php_raw_url_encode).
Discovery 2016-03-31 Entry 2016-04-03 php70
php70-fileinfo
php70-mbstring
php70-phar
php70-snmp
< 7.0.5
php56
php56-fileinfo
php56-mbstring
php56-phar
php56-snmp
< 5.6.20
php55
php55-fileinfo
php55-mbstring
php55-phar
php55-snmp
< 5.5.34
ports/208465
http://php.net/ChangeLog-7.php#7.0.5
http://php.net/ChangeLog-5.php#5.6.20
http://php.net/ChangeLog-5.php#5.5.34
|
b396cf6c-62e6-11e7-9def-b499baebfeaf | oniguruma -- multiple vulnerabilities
the PHP project reports:
- A stack out-of-bounds read occurs in match_at() during regular
expression searching. A logical error involving order of validation
and access in match_at() could result in an out-of-bounds read from
a stack buffer (CVE-2017-9224).
- A heap out-of-bounds write or read occurs in next_state_val()
during regular expression compilation. Octal numbers larger than 0xff
are not handled correctly in fetch_token() and fetch_token_in_cc().
A malformed regular expression containing an octal number in the form
of '\700' would produce an invalid code point value larger than 0xff
in next_state_val(), resulting in an out-of-bounds write memory
corruption (CVE-2017-9226).
- A stack out-of-bounds read occurs in mbc_enc_len() during regular
expression searching. Invalid handling of reg->dmin in
forward_search_range() could result in an invalid pointer dereference,
as an out-of-bounds read from a stack buffer (CVE-2017-9227).
- A heap out-of-bounds write occurs in bitset_set_range() during
regular expression compilation due to an uninitialized variable from
an incorrect state transition. An incorrect state transition in
parse_char_class() could create an execution path that leaves a
critical local variable uninitialized until it's used as an index,
resulting in an out-of-bounds write memory corruption (CVE-2017-9228).
- A SIGSEGV occurs in left_adjust_char_head() during regular expression
compilation. Invalid handling of reg->dmax in forward_search_range() could
result in an invalid pointer dereference, normally as an immediate
denial-of-service condition (CVE-2017-9228).
Discovery 2017-07-06 Entry 2017-07-07 Modified 2018-01-04 libevhtp
< 1.2.14
oniguruma4
< 4.7.2
oniguruma5
< 5.9.7
oniguruma6
< 6.4.0
php56-mbstring
< 5.6.31
php70-mbstring
< 7.0.21
php71-mbstring
< 7.1.7
http://php.net/ChangeLog-7.php
CVE-2017-9224
CVE-2017-9226
CVE-2017-9227
CVE-2017-9228
CVE-2017-9228
|
66d77c58-3b1d-11e6-8e82-002590263bf5 | php -- multiple vulnerabilities
The PHP Group reports:
Please reference CVE/URL list for details
Discovery 2016-06-23 Entry 2016-06-25 php55
php55-gd
php55-mbstring
php55-wddx
php55-zip
< 5.5.37
php56
php56-gd
php56-mbstring
php56-phar
php56-wddx
php56-zip
< 5.6.23
php70
php70-gd
php70-mbstring
php70-phar
php70-wddx
php70-zip
< 7.0.8
CVE-2015-8874
CVE-2016-5766
CVE-2016-5767
CVE-2016-5768
CVE-2016-5769
CVE-2016-5770
CVE-2016-5771
CVE-2016-5772
CVE-2016-5773
ports/210491
ports/210502
http://php.net/ChangeLog-5.php#5.5.37
http://php.net/ChangeLog-5.php#5.6.23
http://php.net/ChangeLog-7.php#7.0.8
|