1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-10-20 20:09:11 +00:00

Sigh, fix previous entry as it's already documented, combine the information

into previous entry.
This commit is contained in:
Xin LI 2020-09-07 18:04:21 +00:00
parent 3cf2794ffa
commit 130bd47749
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=547913

View File

@ -58,43 +58,6 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="3749ae9e-f132-11ea-97da-d05099c0ae8c">
<topic>MPD -- multiple vulnerabilities</topic>
<affects>
<package>
<name>mpd5</name>
<range><lt>5.9</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Chen Nan of Chaitin Security Research Lab reports:</p>
<blockquote cite="http://mpd.sourceforge.net/doc5/mpd4.html#4">
<p>Fix buffer overflow introduced in version 5.8: processing of
template %aX in a RADIUS authentication response might lead
to unexpected termination of the mpd5 process.
Installations not using RADIUS or not using %aX templates
in RADIUS attributes were not affected.</p>
<p>Fix buffer overflow in parsing of L2TP control packets
introduced in version 4.0 that initially brought in L2TP
support: a specially crafted incoming L2TP control packet
might lead to unexpected termination of the process.
Installations with neither L2TP clients nor L2TP server
configured are not affected.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2020-7465</cvename>
<cvename>CVE-2020-7466</cvename>
<url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>
</references>
<dates>
<discovery>2020-09-06</discovery>
<entry>2020-09-07</entry>
</dates>
</vuln>
<vuln vid="cd97c7ca-f079-11ea-9c31-001b216d295b">
<topic>Multi-link PPP protocol daemon MPD5 remotely exploitable crash</topic>
<affects>
@ -114,11 +77,14 @@ Notes:
</body>
</description>
<references>
<cvename>CVE-2020-7465</cvename>
<cvename>CVE-2020-7466</cvename>
<url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url>
</references>
<dates>
<discovery>2020-09-04</discovery>
<entry>2020-09-06</entry>
<modified>2020-09-07</modified>
</dates>
</vuln>