diff options
author | tijl <tijl@FreeBSD.org> | 2017-06-09 01:08:49 +0800 |
---|---|---|
committer | tijl <tijl@FreeBSD.org> | 2017-06-09 01:08:49 +0800 |
commit | bff0b5066c19a2dc2f05b546286e6682a83e263e (patch) | |
tree | 86a2e527f47ad3383d41f3e9ce3330b803c6336f | |
parent | 2b7c1683796b1bddd6db4fd2a4f7f995816ec091 (diff) | |
download | freebsd-ports-gnome-bff0b5066c19a2dc2f05b546286e6682a83e263e.tar.gz freebsd-ports-gnome-bff0b5066c19a2dc2f05b546286e6682a83e263e.tar.zst freebsd-ports-gnome-bff0b5066c19a2dc2f05b546286e6682a83e263e.zip |
Document GNUTLS-SA-2017-4.
Security: https://gnutls.org/security.html#GNUTLS-SA-2017-4
-rw-r--r-- | security/vuxml/vuln.xml | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 83628889abf0..63c23b376e7c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,34 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b33fb1e0-4c37-11e7-afeb-0011d823eebd"> + <topic>GnuTLS -- Denial of service vulnerability</topic> + <affects> + <package> + <name>gnutls</name> + <range><lt>3.5.13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The GnuTLS project reports:</p> + <blockquote cite="https://gnutls.org/security.html#GNUTLS-SA-2017-4"> + <p>It was found using the TLS fuzzer tools that decoding a status + response TLS extension with valid contents could lead to a crash + due to a null pointer dereference. The issue affects GnuTLS server + applications.</p> + </blockquote> + </body> + </description> + <references> + <url>https://gnutls.org/security.html#GNUTLS-SA-2017-4</url> + </references> + <dates> + <discovery>2017-06-07</discovery> + <entry>2017-06-08</entry> + </dates> + </vuln> + <vuln vid="165e8951-4be0-11e7-a539-0050569f7e80"> <topic>irssi -- remote DoS</topic> <affects> |