Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Jul 2012 12:39:06 +0000 (UTC)
From:      Ryan Steinmetz <zi@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r301606 - in head: dns/nsd security/vuxml
Message-ID:  <201207271239.q6RCd684005916@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: zi
Date: Fri Jul 27 12:39:06 2012
New Revision: 301606
URL: http://svn.freebsd.org/changeset/ports/301606

Log:
  - Update to 3.2.13
  - Cleanup whitespace
  - Document vulnerability in dns/nsd (CVE-2012-29789)
  
  PR:		ports/170208
  Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
  Security:	17f369dc-d7e7-11e1-90a2-000c299b62e1

Modified:
  head/dns/nsd/Makefile
  head/dns/nsd/distinfo
  head/security/vuxml/vuln.xml

Modified: head/dns/nsd/Makefile
==============================================================================
--- head/dns/nsd/Makefile	Fri Jul 27 12:34:54 2012	(r301605)
+++ head/dns/nsd/Makefile	Fri Jul 27 12:39:06 2012	(r301606)
@@ -6,7 +6,7 @@
 #
 
 PORTNAME=	nsd
-PORTVERSION=	3.2.12
+PORTVERSION=	3.2.13
 CATEGORIES=	dns ipv6
 MASTER_SITES=	http://www.nlnetlabs.nl/downloads/nsd/	\
 		ftp://ftp.rhnet.is/pub/nsd/
@@ -50,7 +50,7 @@ PORTDOCS=	CREDITS ChangeLog LICENSE NSD-
 		differences.tex
 
 OPTIONS_DEFINE=	ROOT_SERVER LARGEFILE IPV6 BIND8_STATS ZONE_STATS CHECKING \
-		MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS 
+		MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS
 OPTIONS_DEFAULT=	LARGEFILE IPV6 NSEC3 NSEC3PREHASH MINRESPSIZE
 
 ROOT_SERVER_DESC=	Configure as a root server

Modified: head/dns/nsd/distinfo
==============================================================================
--- head/dns/nsd/distinfo	Fri Jul 27 12:34:54 2012	(r301605)
+++ head/dns/nsd/distinfo	Fri Jul 27 12:39:06 2012	(r301606)
@@ -1,2 +1,2 @@
-SHA256 (nsd-3.2.12.tar.gz) = 73d78e3de88efdf5ebb0106fe3580cb887f5d2adc9ab147d15cf835de7de508e
-SIZE (nsd-3.2.12.tar.gz) = 889490
+SHA256 (nsd-3.2.13.tar.gz) = 6c0abd77d716a80047dac5cb2998b077686f41a93be7e9d10b2746e6f7ac1ac2
+SIZE (nsd-3.2.13.tar.gz) = 886216

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jul 27 12:34:54 2012	(r301605)
+++ head/security/vuxml/vuln.xml	Fri Jul 27 12:39:06 2012	(r301606)
@@ -52,6 +52,38 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="17f369dc-d7e7-11e1-90a2-000c299b62e1">
+    <topic>nsd -- Denial of Service</topic>
+    <affects>
+      <package>
+	<name>nsd</name>
+	<range><lt>3.2.13</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Tom Hendrikx reports:</p>
+	<blockquote cite="http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt">;
+	  <p>It is possible to crash (SIGSEGV) a NSD child server process by
+	     sending it a DNS packet from any host on the internet and the per
+	     zone stats build option is enabled. A crashed child process will
+	     automatically be restarted by the parent process, but an attacker
+	     may keep the NSD server occupied restarting child processes by
+	     sending it a stream of such packets effectively preventing the
+	     NSD server to serve.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-2979</cvename>
+      <url>http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt</url>;
+    </references>
+    <dates>
+      <discovery>2012-07-27</discovery>
+      <entry>2012-07-27</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="ae2fa87c-4bca-4138-8be1-67ce2a19b3a8">
      <topic>rubygem-actionpack -- Denial of Service</topic>
      <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201207271239.q6RCd684005916>