security/vuxml: register security/keycloak vulnerability

Two Xstream related CVEs that might cause a DoS attack:

 * CVE-2022-40151
 * CVE-2022-41966

PR:	268939
This commit is contained in:
Fernando Apesteguía 2023-01-16 14:26:18 +01:00
parent db9a594cc0
commit 5e8cd88070
1 changed files with 42 additions and 0 deletions

View File

@ -1,3 +1,45 @@
<vuln vid="9d9e9439-959e-11ed-b464-b42e991fc52e">
<topic>security/keycloak -- Multiple possible DoS attacks</topic>
<affects>
<package>
<name>keycloak</name>
<range><lt>20.0.3</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>CIRCL reports:</p>
<blockquote cite="https://cve.circl.lu/cve/CVE-2022-41966">
<ul>
<li>CVE-2022-41966: XStream serializes Java objects to XML
and back again.
Versions prior to 1.4.20 may allow a remote attacker
to terminate the application with a stack
overflow error, resulting in a denial of
service only via manipulation the
processed input stream.
</li>
<li>CVE-2022-40151: If the parser is running on user
supplied input, an attacker may supply content that
causes the parser to crash by stackoverflow. This
effect may support a denial of service attack.
</li>
</ul>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2022-40151</cvename>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40151</url>
<cvename>CVE-2022-41966</cvename>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-41966</url>
</references>
<dates>
<discovery>2022-09-07</discovery>
<entry>2023-01-16</entry>
</dates>
</vuln>
<vuln vid="847f16e5-9406-11ed-a925-3065ec8fd3ec">
<topic>security/tor -- SOCKS4(a) inversion bug</topic>
<affects>