svn commit: r301606 - in head: dns/nsd security/vuxml
Ryan Steinmetz
zi at FreeBSD.org
Fri Jul 27 12:39:07 UTC 2012
Author: zi
Date: Fri Jul 27 12:39:06 2012
New Revision: 301606
URL: http://svn.freebsd.org/changeset/ports/301606
Log:
- Update to 3.2.13
- Cleanup whitespace
- Document vulnerability in dns/nsd (CVE-2012-29789)
PR: ports/170208
Submitted by: Jaap Akkerhuis <jaap at NLnetLabs.nl> (maintainer)
Security: 17f369dc-d7e7-11e1-90a2-000c299b62e1
Modified:
head/dns/nsd/Makefile
head/dns/nsd/distinfo
head/security/vuxml/vuln.xml
Modified: head/dns/nsd/Makefile
==============================================================================
--- head/dns/nsd/Makefile Fri Jul 27 12:34:54 2012 (r301605)
+++ head/dns/nsd/Makefile Fri Jul 27 12:39:06 2012 (r301606)
@@ -6,7 +6,7 @@
#
PORTNAME= nsd
-PORTVERSION= 3.2.12
+PORTVERSION= 3.2.13
CATEGORIES= dns ipv6
MASTER_SITES= http://www.nlnetlabs.nl/downloads/nsd/ \
ftp://ftp.rhnet.is/pub/nsd/
@@ -50,7 +50,7 @@ PORTDOCS= CREDITS ChangeLog LICENSE NSD-
differences.tex
OPTIONS_DEFINE= ROOT_SERVER LARGEFILE IPV6 BIND8_STATS ZONE_STATS CHECKING \
- MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS
+ MINRESPSIZE NSEC3 NSEC3PREHASH MMAP MAXIPS DOCS
OPTIONS_DEFAULT= LARGEFILE IPV6 NSEC3 NSEC3PREHASH MINRESPSIZE
ROOT_SERVER_DESC= Configure as a root server
Modified: head/dns/nsd/distinfo
==============================================================================
--- head/dns/nsd/distinfo Fri Jul 27 12:34:54 2012 (r301605)
+++ head/dns/nsd/distinfo Fri Jul 27 12:39:06 2012 (r301606)
@@ -1,2 +1,2 @@
-SHA256 (nsd-3.2.12.tar.gz) = 73d78e3de88efdf5ebb0106fe3580cb887f5d2adc9ab147d15cf835de7de508e
-SIZE (nsd-3.2.12.tar.gz) = 889490
+SHA256 (nsd-3.2.13.tar.gz) = 6c0abd77d716a80047dac5cb2998b077686f41a93be7e9d10b2746e6f7ac1ac2
+SIZE (nsd-3.2.13.tar.gz) = 886216
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Jul 27 12:34:54 2012 (r301605)
+++ head/security/vuxml/vuln.xml Fri Jul 27 12:39:06 2012 (r301606)
@@ -52,6 +52,38 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="17f369dc-d7e7-11e1-90a2-000c299b62e1">
+ <topic>nsd -- Denial of Service</topic>
+ <affects>
+ <package>
+ <name>nsd</name>
+ <range><lt>3.2.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tom Hendrikx reports:</p>
+ <blockquote cite="http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt">
+ <p>It is possible to crash (SIGSEGV) a NSD child server process by
+ sending it a DNS packet from any host on the internet and the per
+ zone stats build option is enabled. A crashed child process will
+ automatically be restarted by the parent process, but an attacker
+ may keep the NSD server occupied restarting child processes by
+ sending it a stream of such packets effectively preventing the
+ NSD server to serve.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-2979</cvename>
+ <url>http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt</url>
+ </references>
+ <dates>
+ <discovery>2012-07-27</discovery>
+ <entry>2012-07-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ae2fa87c-4bca-4138-8be1-67ce2a19b3a8">
<topic>rubygem-actionpack -- Denial of Service</topic>
<affects>
More information about the svn-ports-head
mailing list