From owner-dev-commits-ports-main@freebsd.org Sun Sep 19 17:52:55 2021 Return-Path: Delivered-To: dev-commits-ports-main@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8224E66E8E0; Sun, 19 Sep 2021 17:52:55 +0000 (UTC) (envelope-from eugen@freebsd.org) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HCFdy75VHz3qg6; Sun, 19 Sep 2021 17:52:54 +0000 (UTC) (envelope-from eugen@freebsd.org) Received: from eg.sd.rdtc.ru (root@eg.sd.rdtc.ru [62.231.161.221] (may be forged)) by hz.grosbein.net (8.15.2/8.15.2) with ESMTPS id 18JHqkaQ099456 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 19 Sep 2021 17:52:47 GMT (envelope-from eugen@freebsd.org) X-Envelope-From: eugen@freebsd.org X-Envelope-To: herbert@gojira.at Received: from [10.58.0.10] (dadvw [10.58.0.10]) by eg.sd.rdtc.ru (8.16.1/8.16.1) with ESMTPS id 18JHqi8Z055275 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Mon, 20 Sep 2021 00:52:44 +0700 (+07) (envelope-from eugen@freebsd.org) Subject: Re: git: 2c7d4d50c06a - main - security/vuxml: add net/mpd5 PPPoE Server remotely exploitable crash To: "Herbert J. Skuhra" References: <202109082208.188M8tVX016686@gitrepo.freebsd.org> <87v92xjbai.wl-herbert@gojira.at> Cc: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Eugene Grosbein Message-ID: Date: Mon, 20 Sep 2021 00:52:39 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <87v92xjbai.wl-herbert@gojira.at> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT autolearn=disabled version=3.4.2 X-Spam-Report: * -0.0 SHORTCIRCUIT No description available. * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on hz.grosbein.net X-Rspamd-Queue-Id: 4HCFdy75VHz3qg6 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[] X-BeenThere: dev-commits-ports-main@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commits to the main branch of the FreeBSD ports repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 Sep 2021 17:52:55 -0000 19.09.2021 14:04, Herbert J. Skuhra wrote: > On Thu, 09 Sep 2021 00:08:55 +0200, Eugene Grosbein wrote: >> >> The branch main has been updated by eugen: >> >> URL: https://cgit.FreeBSD.org/ports/commit/?id=2c7d4d50c06ac12410414813427604ee9af673dd >> >> commit 2c7d4d50c06ac12410414813427604ee9af673dd >> Author: Eugene Grosbein >> AuthorDate: 2021-09-08 21:55:19 +0000 >> Commit: Eugene Grosbein >> CommitDate: 2021-09-08 22:02:51 +0000 >> >> security/vuxml: add net/mpd5 PPPoE Server remotely exploitable crash >> >> Version 5.9_2 contains security fix for PPPoE servers. >> Insufficient validation of incoming PPPoE Discovery request >> specially crafted by unauthenticated user might lead to unexpected >> termination of the process. The problem affects mpd versions since 5.0. >> Installations not using PPPoE server configuration were not affected. >> >> Reported by: Yannick C at SourceForge >> Tested by: Yannick C at SourceForge, paul at SourceForge >> --- >> security/vuxml/vuln-2021.xml | 28 ++++++++++++++++++++++++++++ >> 1 file changed, 28 insertions(+) >> >> diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml >> index 09525e60d803..1b308b51ea74 100644 >> --- a/security/vuxml/vuln-2021.xml >> +++ b/security/vuxml/vuln-2021.xml >> @@ -1,3 +1,31 @@ >> + >> + MPD5 PPPoE Server remotely exploitable crash >> + >> + >> + mpd5 >> + 5.0 >> + 5.9_2 >> + >> + >> + >> + >> +

Version 5.9_2 contains security fix for PPPoE servers. >> + Insufficient validation of incoming PPPoE Discovery request >> + specially crafted by unauthenticated user might lead to unexpected >> + termination of the process. The problem affects mpd versions >> + since 5.0. Installations not using PPPoE server configuration >> + were not affected.

>> + >> +
>> + >> + http://mpd.sourceforge.net/doc5/mpd4.html#4 >> + >> + >> + 2021-09-04 >> + 2021-09-09 >> + >> +
>> + > > ===> mpd5-5.9_4 has known vulnerabilities: > mpd5-5.9_4 is vulnerable: > MPD5 PPPoE Server remotely exploitable crash > WWW: https://vuxml.FreeBSD.org/freebsd/f55921aa-10c9-11ec-8647-00e0670f2660.html That VuXML entry problem was fixed 17 September but pkg audit fetches http://vuxml.freebsd.org/freebsd/vuln.xml.xz and this file staled since 16 September for unknown reason.