Date: Wed, 7 Apr 2021 16:11:45 GMT From: Lewis Cook <lcook@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 01b07b7e020b - main - security/vuxml: Document upnp stack overflow vulnerability Message-ID: <202104071611.137GBjqM073319@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by lcook: URL: https://cgit.FreeBSD.org/ports/commit/?id=01b07b7e020b9a5809980a3c85fd5ef73c9a354e commit 01b07b7e020b9a5809980a3c85fd5ef73c9a354e Author: Lewis Cook <lcook@FreeBSD.org> AuthorDate: 2021-04-06 22:46:50 +0000 Commit: Lewis Cook <lcook@FreeBSD.org> CommitDate: 2021-04-07 16:10:15 +0000 security/vuxml: Document upnp stack overflow vulnerability Approved by: fernape (mentor) Differential Revision: https://reviews.freebsd.org/D29618 --- security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 6587e1795852..4258c7cae6a7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -178,6 +178,36 @@ Notes: </dates> </vuln> + <vuln vid="79fa9f23-9725-11eb-b530-7085c2fb2c14"> + <topic>upnp -- stack overflow vulnerability</topic> + <affects> + <package> + <name>upnp</name> + <range><lt>1.14.5,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mitre reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28302"> + <p> + A stack overflow in pupnp 1.16.1 can cause the denial of service through the + Parser_parseDocument() function. ixmlNode_free() will release a child node + recursively, which will consume stack space and lead to a crash. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-28302</cvename> + <url>https://github.com/pupnp/pupnp/issues/249</url> + </references> + <dates> + <discovery>2021-03-12</discovery> + <entry>2021-04-06</entry> + </dates> + </vuln> + <vuln vid="dec7e4b6-961a-11eb-9c34-080027f515ea"> <topic>ruby -- XML round-trip vulnerability in REXML</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104071611.137GBjqM073319>