diff options
author | Mateusz Piotrowski <0mp@FreeBSD.org> | 2021-11-25 01:51:41 +0000 |
---|---|---|
committer | Mateusz Piotrowski <0mp@FreeBSD.org> | 2021-11-25 01:54:25 +0000 |
commit | a1d339358646f807e73e8a5130ff2cde983c3e32 (patch) | |
tree | 8aed0d5f525129b5998a5277eb8a5a731c6443d7 | |
parent | e6d691fbfc0e56de79137f5de4008faa99a27356 (diff) | |
download | ports-a1d339358646f807e73e8a5130ff2cde983c3e32.tar.gz ports-a1d339358646f807e73e8a5130ff2cde983c3e32.zip |
security/vuxml: Mark java/bouncycastle as vulnerable where applicable
Some of the reported java/bouncycastle15 security issues affect the
legacy port of java/bouncycastle as well. Update vuxml.xml accordingly.
Sponsored by: Modirum MDPay
Sponsored by: Klara, Inc.
-rw-r--r-- | security/vuxml/vuln-2017.xml | 4 | ||||
-rw-r--r-- | security/vuxml/vuln-2018.xml | 4 | ||||
-rw-r--r-- | security/vuxml/vuln-2021.xml | 8 |
3 files changed, 14 insertions, 2 deletions
diff --git a/security/vuxml/vuln-2017.xml b/security/vuxml/vuln-2017.xml index 042ca4a18394..9e78bc4ba88c 100644 --- a/security/vuxml/vuln-2017.xml +++ b/security/vuxml/vuln-2017.xml @@ -51,6 +51,10 @@ <topic>The Bouncy Castle Crypto APIs: CVE-2017-13098 ("ROBOT")</topic> <affects> <package> + <name>bouncycastle</name> + <range><lt>1.59</lt></range> + </package> + <package> <name>bouncycastle15</name> <range><lt>1.59</lt></range> </package> diff --git a/security/vuxml/vuln-2018.xml b/security/vuxml/vuln-2018.xml index f7070bce36c7..ccf9fab5631e 100644 --- a/security/vuxml/vuln-2018.xml +++ b/security/vuxml/vuln-2018.xml @@ -5628,6 +5628,10 @@ a PingInterval period.</p> <topic>Several Security Defects in the Bouncy Castle Crypto APIs</topic> <affects> <package> + <name>bouncycastle</name> + <range><lt>1.60</lt></range> + </package> + <package> <name>bouncycastle15</name> <range><lt>1.60</lt></range> </package> diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 60390f655b37..03289dce1536 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -3216,7 +3216,7 @@ The string hashing algorithm has been replaced with a better one, and now also u <affects> <package> <name>bouncycastle15</name> - <range><lt>1.67</lt></range> + <range><ge>1.65</ge><lt>1.67</lt></range> </package> </affects> <description> @@ -3243,12 +3243,16 @@ The string hashing algorithm has been replaced with a better one, and now also u </vuln> <vuln vid="89d5bca6-0150-11ec-bf0c-080027eedc6a"> - <topic>bouncycastle15 -- EC math vulnerability</topic> + <topic>The Bouncy Castle Crypto APIs -- EC math vulnerability</topic> <affects> <package> <name>bouncycastle15</name> <range><lt>1.66</lt></range> </package> + <package> + <name>bouncycastle</name> + <range><lt>1.66</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> |