aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMateusz Piotrowski <0mp@FreeBSD.org>2021-11-25 01:51:41 +0000
committerMateusz Piotrowski <0mp@FreeBSD.org>2021-11-25 01:54:25 +0000
commita1d339358646f807e73e8a5130ff2cde983c3e32 (patch)
tree8aed0d5f525129b5998a5277eb8a5a731c6443d7
parente6d691fbfc0e56de79137f5de4008faa99a27356 (diff)
downloadports-a1d339358646f807e73e8a5130ff2cde983c3e32.tar.gz
ports-a1d339358646f807e73e8a5130ff2cde983c3e32.zip
security/vuxml: Mark java/bouncycastle as vulnerable where applicable
Some of the reported java/bouncycastle15 security issues affect the legacy port of java/bouncycastle as well. Update vuxml.xml accordingly. Sponsored by: Modirum MDPay Sponsored by: Klara, Inc.
-rw-r--r--security/vuxml/vuln-2017.xml4
-rw-r--r--security/vuxml/vuln-2018.xml4
-rw-r--r--security/vuxml/vuln-2021.xml8
3 files changed, 14 insertions, 2 deletions
diff --git a/security/vuxml/vuln-2017.xml b/security/vuxml/vuln-2017.xml
index 042ca4a18394..9e78bc4ba88c 100644
--- a/security/vuxml/vuln-2017.xml
+++ b/security/vuxml/vuln-2017.xml
@@ -51,6 +51,10 @@
<topic>The Bouncy Castle Crypto APIs: CVE-2017-13098 ("ROBOT")</topic>
<affects>
<package>
+ <name>bouncycastle</name>
+ <range><lt>1.59</lt></range>
+ </package>
+ <package>
<name>bouncycastle15</name>
<range><lt>1.59</lt></range>
</package>
diff --git a/security/vuxml/vuln-2018.xml b/security/vuxml/vuln-2018.xml
index f7070bce36c7..ccf9fab5631e 100644
--- a/security/vuxml/vuln-2018.xml
+++ b/security/vuxml/vuln-2018.xml
@@ -5628,6 +5628,10 @@ a PingInterval period.</p>
<topic>Several Security Defects in the Bouncy Castle Crypto APIs</topic>
<affects>
<package>
+ <name>bouncycastle</name>
+ <range><lt>1.60</lt></range>
+ </package>
+ <package>
<name>bouncycastle15</name>
<range><lt>1.60</lt></range>
</package>
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 60390f655b37..03289dce1536 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -3216,7 +3216,7 @@ The string hashing algorithm has been replaced with a better one, and now also u
<affects>
<package>
<name>bouncycastle15</name>
- <range><lt>1.67</lt></range>
+ <range><ge>1.65</ge><lt>1.67</lt></range>
</package>
</affects>
<description>
@@ -3243,12 +3243,16 @@ The string hashing algorithm has been replaced with a better one, and now also u
</vuln>
<vuln vid="89d5bca6-0150-11ec-bf0c-080027eedc6a">
- <topic>bouncycastle15 -- EC math vulnerability</topic>
+ <topic>The Bouncy Castle Crypto APIs -- EC math vulnerability</topic>
<affects>
<package>
<name>bouncycastle15</name>
<range><lt>1.66</lt></range>
</package>
+ <package>
+ <name>bouncycastle</name>
+ <range><lt>1.66</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">