This page displays vulnerability information about FreeBSD Ports.
The last vuln.xml file processed by FreshPorts is:
nothing found there
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
|063399fc-f6d6-11dc-bcee-001c2514716c||bzip2 -- crash with certain malformed archive files|
|0ddb57a9-da20-4e99-b048-4366092f3d31||bzip2 -- integer overflow vulnerability|
|197f444f-e8ef-11d9-b875-0001020eed82||bzip2 -- denial of service and permission race vulnerabilities|
Two problems have been discovered relating to the extraction of bzip2-compressed files. First, a carefully constructed invalid bzip2 archive can cause bzip2 to enter an infinite loop. Second, when creating a new file, bzip2 closes the file before setting its permissions.
The first problem can cause bzip2 to extract a bzip2 archive to an infinitely large file. If bzip2 is used in automated processing of untrusted files this could be exploited by an attacker to create an denial-of-service situation by exhausting disk space or by consuming all available cpu time.
The second problem can allow a local attacker to change the permissions of local files owned by the user executing bzip2 providing that they have write access to the directory in which the file is being extracted.
Do not uncompress bzip2 archives from untrusted sources and do not uncompress files in directories where untrusted users have write access.
ge 5.4 lt 5.4_3
ge 5.0 lt 5.3_17
ge 4.11 lt 4.11_11
|4b6cb45d-881e-447a-a4e0-c97a954ea758||bzip2 -- multiple issues|
bzip2 developers reports: