FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
12156786-b18a-11eb-8cba-080027b00c2ecyrus-imapd -- Remote authenticated users could bypass intended access restrictions on certain server annotations.

Cyrus IMAP 3.4.1 Release Notes states:

Fixed CVE-2021-32056: Remote authenticated users could bypass intended access restrictions on certain server annotations. Additionally, a long-standing bug in replication did not allow server annotations to be replicated. Combining these two bugs, a remote authenticated user could stall replication, requiring administrator intervention.


Discovery 2021-05-05
Entry 2021-05-10
cyrus-imapd34
ge 3.4.0 lt 3.4.1

cyrus-imapd32
ge 3.2.0 lt 3.2.7

CVE-2021-32056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32056
3d915d96-0b1f-11ec-8d9f-080027415d17cyrus-imapd -- multiple-minute daemon hang via input that is mishandled during hash-table interaction

Cyrus IMAP 3.4.2 Release Notes states:

Fixed CVE-2021-33582: Certain user inputs are used as hash table keys during processing. A poorly chosen string hashing algorithm meant that the user could control which bucket their data was stored in, allowing a malicious user to direct many inputs to a single bucket. Each subsequent insertion to the same bucket requires a strcmp of every other entry in it. At tens of thousands of entries, each new insertion could keep the CPU busy in a strcmp loop for minutes. The string hashing algorithm has been replaced with a better one, and now also uses a random seed per hash table, so malicious inputs cannot be precomputed.


Discovery 2021-05-26
Entry 2021-09-01
cyrus-imapd34
< 3.4.2

cyrus-imapd32
< 3.2.8

cyrus-imapd30
< 3.0.16

cyrus-imapd25
cyrus-imapd24
cyrus-imapd23
gt 0

CVE-2021-33582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33582