aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2015-02-24 06:13:03 +0800
committerdelphij <delphij@FreeBSD.org>2015-02-24 06:13:03 +0800
commit774585611de8da1776dc81b027502d89032e6679 (patch)
treec8166cca0c7ae42bdda098e0a35b095a5ca207e3 /security/vuxml
parenta8268307cdf9a3576ee1d985f55fbb1d328ddc67 (diff)
downloadfreebsd-ports-gnome-774585611de8da1776dc81b027502d89032e6679.tar.gz
freebsd-ports-gnome-774585611de8da1776dc81b027502d89032e6679.tar.zst
freebsd-ports-gnome-774585611de8da1776dc81b027502d89032e6679.zip
Document BIND DoS issue with trust anchor management.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml39
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3fe05fd67253..fbed3010ad26 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,45 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="58033a95-bba8-11e4-88ae-d050992ecde8">
+ <topic>bind -- denial of service vulnerability</topic>
+ <affects>
+ <package>
+ <name>bind910</name>
+ <name>bind910-base</name>
+ <range><lt>9.10.1P2</lt></range>
+ </package>
+ <package>
+ <name>bind99</name>
+ <name>bind99-base</name>
+ <range><lt>9.9.6P2</lt></range>
+ </package>
+ <package>
+ <name>FreeBSD</name>
+ <range><gt>9.3</gt><lt>9.3_10</lt></range>
+ <range><gt>8.4</gt><lt>8.4_24</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>ISC reports:</p>
+ <blockquote cite="https://kb.isc.org/article/AA-01235">
+ <p>When configured to perform DNSSEC validation, named can
+ crash when encountering a rare set of conditions in the
+ managed trust anchors.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-1349</cvename>
+ <url>https://kb.isc.org/article/AA-01235</url>
+ </references>
+ <dates>
+ <discovery>2015-02-18</discovery>
+ <entry>2015-02-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="63527d0d-b9de-11e4-8a48-206a8a720317">
<topic>krb5 1.12 -- New release/fix multiple vulnerabilities</topic>
<affects>