Date: Thu, 10 Sep 2020 00:10:25 +0000 (UTC) From: Craig Leres <leres@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r548169 - head/security/vuxml Message-ID: <202009100010.08A0APOi083195@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: leres Date: Thu Sep 10 00:10:25 2020 New Revision: 548169 URL: https://svnweb.freebsd.org/changeset/ports/548169 Log: security/vuxml: Mark zeek < 3.0.10 as vulnerable as per: https://github.com/zeek/zeek/releases/tag/v3.0.10 Memory leak has potential for remote DOS via resource exhaustion. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Sep 9 23:38:10 2020 (r548168) +++ head/security/vuxml/vuln.xml Thu Sep 10 00:10:25 2020 (r548169) @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2c92fdd3-896c-4a5a-a0d8-52acee69182d"> + <topic>zeek -- Various vulnerabilities</topic> + <affects> + <package> + <name>zeek</name> + <range><lt>3.0.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jon Siwek of Corelight reports:</p> + <blockquote cite="INSERT URL HERE"> + <p>This release fixes the following security issue:</p> + <ul> + <li>The AYIYA and GTPv1 parsing/decapsulation logic may + leak memory -- These leaks have potential for remote + exploitation to cause Denial of Service via resource + exhaustion.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/zeek/zeek/releases/tag/v3.0.10</url> + </references> + <dates> + <discovery>2020-08-28</discovery> + <entry>2020-09-09</entry> + </dates> + </vuln> + <vuln vid="bed5d41a-f2b4-11ea-a878-e09467587c17"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202009100010.08A0APOi083195>