diff options
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 93e38ef0da44..2273249ea72b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,35 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e4dd787e-0ea9-11e8-95f2-005056925db4"> + <topic>libtorrent -- remote DoS</topic> + <affects> + <package> + <name>libtorrent</name> + <range><lt>0.13.6_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>X-cela reports:</p> + <blockquote cite="https://github.com/rakshasa/libtorrent/pull/99"> + <p>Calls into build_benocde that use %zu could crash on 64 bit + machines due to the size change of size_t. Someone can force + READ_ENC_IA to fail allowing an internal_error to be thrown + and bring down the client.</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/rakshasa/libtorrent/pull/99</url> + <freebsdpr>ports/224664</freebsdpr> + </references> + <dates> + <discovery>2015-12-01</discovery> + <entry>2018-02-10</entry> + </dates> + </vuln> + <vuln vid="316b3c3e-0e98-11e8-8d41-97657151f8c2"> <topic>exim -- a buffer overflow vulnerability, remote code execution</topic> <affects> |