git: beca8ec1ad3d - main - net/routinator: Update to 0.13.2
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 28 Feb 2024 19:05:13 UTC
The branch main has been updated by nc: URL: https://cgit.FreeBSD.org/ports/commit/?id=beca8ec1ad3dadfdd2473e0899caf8930c60628f commit beca8ec1ad3dadfdd2473e0899caf8930c60628f Author: Jaap Akkerhuis <jaap@NLnetLabs.nl> AuthorDate: 2024-02-28 13:27:51 +0000 Commit: Neel Chauhan <nc@FreeBSD.org> CommitDate: 2024-02-28 19:04:54 +0000 net/routinator: Update to 0.13.2 Changes: https://nlnetlabs.nl/news/2024/Feb/26/routinator-0.13.2-released/ MFH: 2024Q1 PR: 277375 --- net/routinator/Makefile | 3 +-- net/routinator/distinfo | 6 +++--- security/vuxml/vuln/2024.xml | 27 +++++++++++++++++++++++++++ 3 files changed, 31 insertions(+), 5 deletions(-) diff --git a/net/routinator/Makefile b/net/routinator/Makefile index 70c206b4730c..48f2cdfd8632 100644 --- a/net/routinator/Makefile +++ b/net/routinator/Makefile @@ -1,7 +1,6 @@ PORTNAME= routinator DISTVERSIONPREFIX= v -DISTVERSION= 0.13.1 -PORTREVISION= 2 +DISTVERSION= 0.13.2 CATEGORIES= net MASTER_SITES= ${ROUTINATOR_UI_URL}/v${ROUTINATOR_UI_VERSION}/:0 DISTFILES+= routinator-ui-build.tar.gz:0 diff --git a/net/routinator/distinfo b/net/routinator/distinfo index 1526547874bb..a4046b53fc0d 100644 --- a/net/routinator/distinfo +++ b/net/routinator/distinfo @@ -1,4 +1,4 @@ -TIMESTAMP = 1707312619 +TIMESTAMP = 1709146884 SHA256 (routinator-ui-build.tar.gz) = 7079096b3fd986aa01b03cf3e743cf74d37b8441d312844c25e2b065deed8290 SIZE (routinator-ui-build.tar.gz) = 756828 SHA256 (rust/crates/addr2line-0.21.0.crate) = 8a30b2e23b9e17a9f90641c7ab1549cd9b44f296d3ccbf309d2863cfe398a0cb @@ -421,5 +421,5 @@ SHA256 (rust/crates/winreg-0.50.0.crate) = 524e57b2c537c0f9b1e69f1965311ec12182b SIZE (rust/crates/winreg-0.50.0.crate) = 29703 SHA256 (rust/crates/xattr-1.3.1.crate) = 8da84f1a25939b27f6820d92aed108f83ff920fdf11a7b19366c27c4cda81d4f SIZE (rust/crates/xattr-1.3.1.crate) = 12580 -SHA256 (NLnetLabs-routinator-v0.13.1_GH0.tar.gz) = bf88bf03c749ba98a653a45313008d4f88cc9920395662d789be2d0529dd7870 -SIZE (NLnetLabs-routinator-v0.13.1_GH0.tar.gz) = 5455937 +SHA256 (NLnetLabs-routinator-v0.13.2_GH0.tar.gz) = 77c3b74b508caabf4c59387480cda18b222d817fd70328f8c73a8fb45a774108 +SIZE (NLnetLabs-routinator-v0.13.2_GH0.tar.gz) = 5456095 diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index d425738ea7e7..8938a3888d23 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,30 @@ + <vuln vid="3dada2d5-4e17-4e39-97dd-14fdbd4356fb"> + <topic>null -- Routinator terminates when RTR connection is reset too quickly after opening</topic> + <affects> + <package> + <name>null</name> + <range><lt>null</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>sep@nlnetlabs.nl reports:</p> + <blockquote cite="https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt"> + <p>Due to a mistake in error checking, Routinator will terminate when + an incoming RTR connection is reset by the peer too quickly after + opening.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-1622</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-1622</url> + </references> + <dates> + <discovery>2024-02-26</discovery> + <entry>2024-02-28</entry> + </dates> + </vuln> <vuln vid="02e33cd1-c655-11ee-8613-08002784c58d"> <topic>curl -- OCSP verification bypass with TLS session reuse</topic> <affects>