Date: Mon, 28 Mar 2016 01:51:04 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r412026 - head/security/vuxml Message-ID: <201603280151.u2S1p4f0063619@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Mon Mar 28 01:51:04 2016 New Revision: 412026 URL: https://svnweb.freebsd.org/changeset/ports/412026 Log: Document BIND security advisories PR: 208034 Reported by: martin@lispworks.com Security: CVE-2016-1285 Security: CVE-2016-1286 Security: CVE-2016-2088 Security: https://vuxml.FreeBSD.org/freebsd/c9075321-f483-11e5-92ce-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/cba246d2-f483-11e5-92ce-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/cd409df7-f483-11e5-92ce-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Mar 28 01:50:19 2016 (r412025) +++ head/security/vuxml/vuln.xml Mon Mar 28 01:51:04 2016 (r412026) @@ -58,6 +58,125 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="cd409df7-f483-11e5-92ce-002590263bf5"> + <topic>bind -- denial of service vulnerability</topic> + <affects> + <package> + <name>bind910</name> + <range><ge>9.10.0</ge><lt>9.10.3P4</lt></range> + </package> + <package> + <name>bind9-devel</name> + <range><lt>9.11.0.a20160309</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://kb.isc.org/article/AA-01351"> + <p>A response containing multiple DNS cookies causes servers with + cookie support enabled to exit with an assertion failure.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-2088</cvename> + <url>https://kb.isc.org/article/AA-01351</url> + </references> + <dates> + <discovery>2016-03-09</discovery> + <entry>2016-03-28</entry> + </dates> + </vuln> + + <vuln vid="cba246d2-f483-11e5-92ce-002590263bf5"> + <topic>bind -- denial of service vulnerability</topic> + <affects> + <package> + <name>bind98</name> + <range><le>9.8.8</le></range> + </package> + <package> + <name>bind99</name> + <range><ge>9.9.0</ge><lt>9.9.8P4</lt></range> + </package> + <package> + <name>bind910</name> + <range><ge>9.10.0</ge><lt>9.10.3P4</lt></range> + </package> + <package> + <name>bind9-devel</name> + <range><lt>9.11.0.a20160309</lt></range> + </package> + <package> + <name>FreeBSD</name> + <range><gt>9.3</gt><le>9.3_38</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://kb.isc.org/article/AA-01353"> + <p>A problem parsing resource record signatures for DNAME resource + records can lead to an assertion failure in resolver.c or db.c</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-1286</cvename> + <freebsdsa>SA-16:13.bind</freebsdsa> + <url>https://kb.isc.org/article/AA-01353</url> + </references> + <dates> + <discovery>2016-03-09</discovery> + <entry>2016-03-28</entry> + </dates> + </vuln> + + <vuln vid="c9075321-f483-11e5-92ce-002590263bf5"> + <topic>bind -- denial of service vulnerability</topic> + <affects> + <package> + <name>bind98</name> + <range><le>9.8.8</le></range> + </package> + <package> + <name>bind99</name> + <range><ge>9.9.0</ge><lt>9.9.8P4</lt></range> + </package> + <package> + <name>bind910</name> + <range><ge>9.10.0</ge><lt>9.10.3P4</lt></range> + </package> + <package> + <name>bind9-devel</name> + <range><lt>9.11.0.a20160309</lt></range> + </package> + <package> + <name>FreeBSD</name> + <range><gt>9.3</gt><le>9.3_38</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://kb.isc.org/article/AA-01352"> + <p>An error parsing input received by the rndc control channel can + cause an assertion failure in sexpr.c or alist.c.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-1285</cvename> + <freebsdsa>SA-16:13.bind</freebsdsa> + <url>https://kb.isc.org/article/AA-01352</url> + </references> + <dates> + <discovery>2016-03-09</discovery> + <entry>2016-03-28</entry> + </dates> + </vuln> + <vuln vid="6d25c306-f3bb-11e5-92ce-002590263bf5"> <topic>salt -- Insecure configuration of PAM external authentication service</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201603280151.u2S1p4f0063619>