From owner-svn-ports-head@freebsd.org Wed Aug 10 01:27:46 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0385EBB2B84; Wed, 10 Aug 2016 01:27:46 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B76841C44; Wed, 10 Aug 2016 01:27:45 +0000 (UTC) (envelope-from junovitch@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u7A1Ri3k099813; Wed, 10 Aug 2016 01:27:44 GMT (envelope-from junovitch@FreeBSD.org) Received: (from junovitch@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u7A1Riud099812; Wed, 10 Aug 2016 01:27:44 GMT (envelope-from junovitch@FreeBSD.org) Message-Id: <201608100127.u7A1Riud099812@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: junovitch set sender to junovitch@FreeBSD.org using -f From: Jason Unovitch Date: Wed, 10 Aug 2016 01:27:44 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r419979 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Aug 2016 01:27:46 -0000 Author: junovitch Date: Wed Aug 10 01:27:44 2016 New Revision: 419979 URL: https://svnweb.freebsd.org/changeset/ports/419979 Log: Document denial of service vector via oversized AXFR, IXFR, or Dynamic DNS updates in BIND, Knot, NSD, and PowerDNS Security: CVE-2016-6170 Security: CVE-2016-6171 Security: CVE-2016-6172 Security: CVE-2016-6173 Security: https://vuxml.FreeBSD.org/freebsd/7d08e608-5e95-11e6-b334-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Aug 10 00:19:04 2016 (r419978) +++ head/security/vuxml/vuln.xml Wed Aug 10 01:27:44 2016 (r419979) @@ -58,6 +58,73 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + BIND,Knot,NSD,PowerDNS -- denial over service via oversized zone transfers + + + bind99 + 9.9.9P2 + + + bind910 + 9.10.4P2 + + + bind911 + 9.11.0.b2 + + + bind9-devel + 0 + + + knot + knot1 + 1.6.8 + + + knot2 + 2.3.0 + + + nsd + 4.1.11 + + + powerdns + 4.0.1 + + + + +

ISC reports:

+
+

DNS protocols were designed with the assumption that a certain + amount of trust could be presumed between the operators of primary + and secondary servers for a given zone. However, in current + practice some organizations have scenarios which require them to + accept zone data from sources that are not fully trusted (for + example: providers of secondary name service). A party who is + allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS + updates) can overwhelm the server which is accepting data by + intentionally or accidentally exhausting that server's memory.

+
+ +
+ + CVE-2016-6170 + CVE-2016-6171 + CVE-2016-6172 + CVE-2016-6173 + https://kb.isc.org/article/AA-01390 + http://www.openwall.com/lists/oss-security/2016/07/06/4 + + + 2016-07-06 + 2016-08-10 + +
+ FreeBSD -- Kernel memory disclosure in sctp(4)