1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-03 01:23:49 +00:00

security/vuxml: add CVE-2018-11769 for databases/couchdb versions < 2.2.0

Reported by:	Apache CouchDB PMC
Approved by:	jrm
Security:	CVE-2018-11769
Security:	https://lists.apache.org/thread.html/1052ad7a1b32b9756df4f7860f5cb5a96b739f444117325a19a4bf75@%3Cdev.couchdb.apache.org%3E
Differential Revision:	https://reviews.freebsd.org/D16820
This commit is contained in:
Dave Cottlehuber 2018-08-21 17:53:08 +00:00
parent 20bc8439e1
commit 7eca37dc8f
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=477726

View File

@ -58,6 +58,35 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="9b19b6df-a4be-11e8-9366-0028f8d09152">
<topic>couchdb -- administrator privilege escalation</topic>
<affects>
<package>
<name>couchdb</name>
<range><lt>2.2.0,2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Apache CouchDB PMC reports:</p>
<blockquote cite="https://lists.apache.org/thread.html/1052ad7a1b32b9756df4f7860f5cb5a96b739f444117325a19a4bf75@%3Cdev.couchdb.apache.org%3E">
<p>Database Administrator could achieve privilege escalation to
the account that CouchDB runs under, by abusing insufficient validation
in the HTTP API, escaping security controls implemented in previous
releases.</p>
</blockquote>
</body>
</description>
<references>
<url>http://docs.couchdb.org/en/stable/cve/2018-11769.html</url>
<cvename>CVE-2018-11769</cvename>
</references>
<dates>
<discovery>2018-06-05</discovery>
<entry>2018-08-08</entry>
</dates>
</vuln>
<vuln vid="7762d7ad-2e38-41d2-9785-c51f653ba8bd">
<topic>botan2 -- ECDSA side channel</topic>
<affects>
@ -1694,7 +1723,7 @@ Notes:
<affects>
<package>
<name>couchdb</name>
<range><lt>1.7.2</lt></range>
<range><lt>1.7.2,2</lt></range>
</package>
</affects>
<description>