Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 22 Dec 2020 14:16:44 +0000 (UTC)
From:      Juraj Lutter <otis@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r558911 - head/security/vuxml
Message-ID:  <202012221416.0BMEGihQ018829@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: otis
Date: Tue Dec 22 14:16:43 2020
New Revision: 558911
URL: https://svnweb.freebsd.org/changeset/ports/558911

Log:
  Document vulns for powerdns and postsrsd
  
  Reviewed by:	osa (mentor)
  Approved by:	osa (mentor)
  Differential Revision:	https://reviews.freebsd.org/D27706

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Dec 22 13:29:58 2020	(r558910)
+++ head/security/vuxml/vuln.xml	Tue Dec 22 14:16:43 2020	(r558911)
@@ -58,6 +58,67 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="eb2845c4-43ce-11eb-aba5-00a09858faf5">
+    <topic>postsrsd -- Denial of service vulnerability</topic>
+    <affects>
+      <package>
+	<name>postsrsd</name>
+	<range><lt>1.10</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>postsrsd developer reports:</p>
+	<blockquote cite="https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac">;
+	  <p>PostSRSd could be tricked into consuming a lot of CPU time with
+	    an SRS address that has an excessively long time stamp tag.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2020-35573</cvename>
+      <url>https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac</url>;
+      <url>https://github.com/roehling/postsrsd/releases/tag/1.10</url>;
+    </references>
+    <dates>
+      <discovery>2020-12-12</discovery>
+      <entry>2020-12-21</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="61d89849-43cb-11eb-aba5-00a09858faf5">
+    <topic>powerdns -- Various issues in GSS-TSIG support</topic>
+    <affects>
+      <package>
+	<name>powerdns</name>
+	<range><lt>4.4.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>PowerDNS developers report:</p>
+	<blockquote cite="https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-06.html">;
+	  <p>A remote, unauthenticated attacker can trigger a race condition
+	    leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.</p>
+	  <p>A remote, unauthenticated attacker can cause a denial of service by
+	    sending crafted queries with a GSS-TSIG signature.</p>
+	  <p>A remote, unauthenticated attacker might be able to cause a double-free,
+	    leading to a crash or possibly arbitrary code execution by sending crafted queries with a GSS-TSIG signature.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2020-24696</cvename>
+      <cvename>CVE-2020-24697</cvename>
+      <cvename>CVE-2020-24698</cvename>
+      <url>https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-06.html</url>;
+    </references>
+    <dates>
+      <discovery>2020-08-27</discovery>
+      <entry>2020-12-21</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="cc1fd3da-b8fd-4f4d-a092-c38541c0f993">
     <topic>vault -- User Enumeration via LDAP auth</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202012221416.0BMEGihQ018829>