git: 9d09574f1d25 - main - security/vuxml: Document Unbound vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 09 Mar 2024 15:07:17 UTC
The branch main has been updated by brnrd:
URL: https://cgit.FreeBSD.org/ports/commit/?id=9d09574f1d2529bb34545642d2f27d8ba6dfa773
commit 9d09574f1d2529bb34545642d2f27d8ba6dfa773
Author: Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2024-03-09 15:07:15 +0000
Commit: Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2024-03-09 15:07:15 +0000
security/vuxml: Document Unbound vulnerability
---
security/vuxml/vuln/2024.xml | 37 +++++++++++++++++++++++++++++++++++++
1 file changed, 37 insertions(+)
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 8a4b3ed3783d..9d70362a16c9 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,40 @@
+ <vuln vid="c2ad8700-de25-11ee-9190-84a93843eb75">
+ <topic>Unbound -- Denial-of-Service vulnerability</topic>
+ <affects>
+ <package>
+ <name>unbound</name>
+ <range><gt>1.18.0</gt><lt>1.19.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NLNet Labs reports:</p>
+ <blockquote cite="https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt">
+ <p>Unbound 1.18.0 introduced a feature that removes EDE records from
+ responses with size higher than the client's advertised buffer size.
+ Before removing all the EDE records however, it would try to see if
+ trimming the extra text fields on those records would result in an
+ acceptable size while still retaining the EDE codes. Due to an
+ unchecked condition, the code that trims the text of the EDE records
+ could loop indefinitely. This happens when Unbound would reply with
+ attached EDE information on a positive reply and the client's buffer
+ size is smaller than the needed space to include EDE records.
+
+ The vulnerability can only be triggered when the 'ede: yes' option
+ is used; non default configuration.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2024-1931</cvename>
+ <url>https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt</url>
+ </references>
+ <dates>
+ <discovery>2024-03-07</discovery>
+ <entry>2024-03-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e74da31b-276a-4a22-9772-17dd42b97559">
<topic>electron{27,28} -- vulnerability in libxml2</topic>
<affects>