mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-27 00:57:50 +00:00
- Update to 3.2.13
- Cleanup whitespace - Document vulnerability in dns/nsd (CVE-2012-29789) PR: ports/170208 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Security: 17f369dc-d7e7-11e1-90a2-000c299b62e1
This commit is contained in:
parent
f6cc561454
commit
c90f865d10
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=301606
@ -6,7 +6,7 @@
|
||||
#
|
||||
|
||||
PORTNAME= nsd
|
||||
PORTVERSION= 3.2.12
|
||||
PORTVERSION= 3.2.13
|
||||
CATEGORIES= dns ipv6
|
||||
MASTER_SITES= http://www.nlnetlabs.nl/downloads/nsd/ \
|
||||
ftp://ftp.rhnet.is/pub/nsd/
|
||||
@ -50,7 +50,7 @@ PORTDOCS= CREDITS ChangeLog LICENSE NSD-DATABASE NSD-DIFFFILE \
|
||||
differences.tex
|
||||
|
||||
OPTIONS_DEFINE= ROOT_SERVER LARGEFILE IPV6 BIND8_STATS ZONE_STATS CHECKING \
|
||||
MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS
|
||||
MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS
|
||||
OPTIONS_DEFAULT= LARGEFILE IPV6 NSEC3 NSEC3PREHASH MINRESPSIZE
|
||||
|
||||
ROOT_SERVER_DESC= Configure as a root server
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (nsd-3.2.12.tar.gz) = 73d78e3de88efdf5ebb0106fe3580cb887f5d2adc9ab147d15cf835de7de508e
|
||||
SIZE (nsd-3.2.12.tar.gz) = 889490
|
||||
SHA256 (nsd-3.2.13.tar.gz) = 6c0abd77d716a80047dac5cb2998b077686f41a93be7e9d10b2746e6f7ac1ac2
|
||||
SIZE (nsd-3.2.13.tar.gz) = 886216
|
||||
|
@ -52,6 +52,38 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="17f369dc-d7e7-11e1-90a2-000c299b62e1">
|
||||
<topic>nsd -- Denial of Service</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>nsd</name>
|
||||
<range><lt>3.2.13</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Tom Hendrikx reports:</p>
|
||||
<blockquote cite="http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt">
|
||||
<p>It is possible to crash (SIGSEGV) a NSD child server process by
|
||||
sending it a DNS packet from any host on the internet and the per
|
||||
zone stats build option is enabled. A crashed child process will
|
||||
automatically be restarted by the parent process, but an attacker
|
||||
may keep the NSD server occupied restarting child processes by
|
||||
sending it a stream of such packets effectively preventing the
|
||||
NSD server to serve.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2012-2979</cvename>
|
||||
<url>http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2012-07-27</discovery>
|
||||
<entry>2012-07-27</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="ae2fa87c-4bca-4138-8be1-67ce2a19b3a8">
|
||||
<topic>rubygem-actionpack -- Denial of Service</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user