FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
096ab080-907c-11ec-bb14-002324b2fba8go -- multiple vulnerabilities

The Go project reports:

crypto/elliptic: fix IsOnCurve for big.Int values that are not valid coordinates

Some big.Int values that are not valid field elements (negative or overflowing) might cause Curve.IsOnCurve to incorrectly return true. Operating on those values may cause a panic or an invalid curve operation. Note that Unmarshal will never return such values.

math/big: prevent large memory consumption in Rat.SetString

An attacker can cause unbounded memory growth in a program using (*Rat).SetString due to an unhandled overflow.

cmd/go: prevent branches from materializing into versions

A branch whose name resembles a version tag (such as "v1.0.0" or "subdir/v2.0.0-dev") can be considered a valid version by the go command. Materializing versions from branches might be unexpected and bypass ACLs that limit the creation of tags but not branches.


Discovery 2022-02-10
Entry 2022-02-18
go
< 1.17.7,1

CVE-2022-23806
https://github.com/golang/go/issues/50974
CVE-2022-23772
https://github.com/golang/go/issues/50699
CVE-2022-23773
https://github.com/golang/go/issues/35671
61bce714-ca0c-11ec-9cfc-10c37b4ac2eago -- multiple vulnerabilities

The Go project reports:

encoding/pem: fix stack overflow in Decode.

A large (more than 5 MB) PEM input can cause a stack overflow in Decode, leading the program to crash.

crypto/elliptic: tolerate all oversized scalars in generic P-256.

A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.

crypto/x509: non-compliant certificates can cause a panic in Verify on macOS in Go 1.18.

Verifying certificate chains containing certificates which are not compliant with RFC 5280 causes Certificate.Verify to panic on macOS. These chains can be delivered through TLS and can cause a crypto/tls or net/http client to crash.


Discovery 2022-04-12
Entry 2022-05-02
go
< 1.18.1,1

go117
< 1.17.9

CVE-2022-24675
https://github.com/golang/go/issues/51853
CVE-2022-28327
https://github.com/golang/go/issues/52075
CVE-2022-27536
https://github.com/golang/go/issues/51759
e2af876f-a7c8-11ec-9a2a-002324b2fba8go -- multiple vulnerabilities

The Go project reports:

regexp: stack exhaustion compiling deeply nested expressions

On 64-bit platforms, an extremely deeply nested expression can cause regexp.Compile to cause goroutine stack exhaustion, forcing the program to exit. Note this applies to very large expressions, on the order of 2MB.


Discovery 2022-02-09
Entry 2022-03-19
go
< 1.17.8,1

CVE-2022-24921
https://github.com/golang/go/issues/51112
a1360138-d446-11ec-8ea1-10c37b4ac2eago -- syscall.Faccessat checks wrong group on Linux

The Go project reports:

When called with a non-zero flags parameter, the syscall.Faccessat function could incorrectly report that a file is accessible. This bug only occurs on Linux systems.


Discovery 2022-04-12
Entry 2022-05-15
go
< 1.18.2,1

go117
< 1.17.10

CVE-2022-29526
https://github.com/golang/go/issues/52313
https://groups.google.com/g/golang-dev/c/CPU3TB6d4oY