Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 7 Sep 2020 18:04:21 +0000 (UTC)
From:      Xin LI <delphij@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r547913 - head/security/vuxml
Message-ID:  <202009071804.087I4LBe070823@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: delphij
Date: Mon Sep  7 18:04:21 2020
New Revision: 547913
URL: https://svnweb.freebsd.org/changeset/ports/547913

Log:
  Sigh, fix previous entry as it's already documented, combine the information
  into previous entry.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Sep  7 18:02:55 2020	(r547912)
+++ head/security/vuxml/vuln.xml	Mon Sep  7 18:04:21 2020	(r547913)
@@ -58,43 +58,6 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
-  <vuln vid="3749ae9e-f132-11ea-97da-d05099c0ae8c">
-    <topic>MPD -- multiple vulnerabilities</topic>
-    <affects>
-      <package>
-	<name>mpd5</name>
-	<range><lt>5.9</lt></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Chen Nan of Chaitin Security Research Lab reports:</p>
-	<blockquote cite="http://mpd.sourceforge.net/doc5/mpd4.html#4">;
-	  <p>Fix buffer overflow introduced in version 5.8: processing of
-	    template %aX in a RADIUS authentication response might lead
-	    to unexpected termination of the mpd5 process.
-	    Installations not using RADIUS or not using %aX templates
-	    in RADIUS attributes were not affected.</p>
-	  <p>Fix buffer overflow in parsing of L2TP control packets
-	    introduced in version 4.0 that initially brought in L2TP
-	    support: a specially crafted incoming L2TP control packet
-	    might lead to unexpected termination of the process.
-	    Installations with neither L2TP clients nor L2TP server
-	    configured are not affected.</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <cvename>CVE-2020-7465</cvename>
-      <cvename>CVE-2020-7466</cvename>
-      <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>;
-    </references>
-    <dates>
-      <discovery>2020-09-06</discovery>
-      <entry>2020-09-07</entry>
-    </dates>
-  </vuln>
-
   <vuln vid="cd97c7ca-f079-11ea-9c31-001b216d295b">
     <topic>Multi-link PPP protocol daemon MPD5 remotely exploitable crash</topic>
     <affects>
@@ -114,11 +77,14 @@ Notes:
       </body>
     </description>
     <references>
+      <cvename>CVE-2020-7465</cvename>
+      <cvename>CVE-2020-7466</cvename>
       <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>;
     </references>
     <dates>
       <discovery>2020-09-04</discovery>
       <entry>2020-09-06</entry>
+      <modified>2020-09-07</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202009071804.087I4LBe070823>