Date: Mon, 7 Sep 2020 18:02:55 +0000 (UTC) From: Xin LI <delphij@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r547912 - head/security/vuxml Message-ID: <202009071802.087I2toX070659@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: delphij Date: Mon Sep 7 18:02:55 2020 New Revision: 547912 URL: https://svnweb.freebsd.org/changeset/ports/547912 Log: Document mpd multiple vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Sep 7 17:32:35 2020 (r547911) +++ head/security/vuxml/vuln.xml Mon Sep 7 18:02:55 2020 (r547912) @@ -58,6 +58,43 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3749ae9e-f132-11ea-97da-d05099c0ae8c"> + <topic>MPD -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mpd5</name> + <range><lt>5.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chen Nan of Chaitin Security Research Lab reports:</p> + <blockquote cite="http://mpd.sourceforge.net/doc5/mpd4.html#4"> + <p>Fix buffer overflow introduced in version 5.8: processing of + template %aX in a RADIUS authentication response might lead + to unexpected termination of the mpd5 process. + Installations not using RADIUS or not using %aX templates + in RADIUS attributes were not affected.</p> + <p>Fix buffer overflow in parsing of L2TP control packets + introduced in version 4.0 that initially brought in L2TP + support: a specially crafted incoming L2TP control packet + might lead to unexpected termination of the process. + Installations with neither L2TP clients nor L2TP server + configured are not affected.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-7465</cvename> + <cvename>CVE-2020-7466</cvename> + <url>http://mpd.sourceforge.net/doc5/mpd4.html#4</url> + </references> + <dates> + <discovery>2020-09-06</discovery> + <entry>2020-09-07</entry> + </dates> + </vuln> + <vuln vid="cd97c7ca-f079-11ea-9c31-001b216d295b"> <topic>Multi-link PPP protocol daemon MPD5 remotely exploitable crash</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202009071802.087I2toX070659>