git: e17484d0cf79 - main - security/vuxml: add dnsmasq DHCPv6 vuln <= 2.86

From: Matthias Andree <mandree_at_FreeBSD.org>
Date: Sun, 03 Apr 2022 11:16:11 UTC
The branch main has been updated by mandree:

URL: https://cgit.FreeBSD.org/ports/commit/?id=e17484d0cf790779014ba7a5e14c11924701d7fe

commit e17484d0cf790779014ba7a5e14c11924701d7fe
Author:     Matthias Andree <mandree@FreeBSD.org>
AuthorDate: 2022-04-03 10:55:57 +0000
Commit:     Matthias Andree <mandree@FreeBSD.org>
CommitDate: 2022-04-03 11:15:57 +0000

    security/vuxml: add dnsmasq DHCPv6 vuln <= 2.86
    
    Security:       3f321a5a-b33b-11ec-80c2-1bb2c6a00592
    Security:       CVE-2022-0934
---
 security/vuxml/vuln-2022.xml | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index f06eee6e740a..70e29c4a4606 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,39 @@
+  <vuln vid="3f321a5a-b33b-11ec-80c2-1bb2c6a00592">
+    <topic>dnsmasq -- heap use-after-free in dhcp6_no_relay</topic>
+    <affects>
+      <package>
+	<name>dnsmasq</name>
+	<range><lt>2.86_4,1</lt></range>
+      </package>
+      <package>
+	<name>dnsmasq-devel</name>
+	<range><lt>2.86_4,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Petr Menšík reports:</p>
+	<blockquote cite="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html">
+	  <p>Possible vulnerability [...] found in latest dnsmasq. It [was] found
+	    with help of oss-fuzz Google project by me and short after that
+	    independently also by Richard Johnson of Trellix Threat Labs.</p>
+	  <p>It is affected only by DHCPv6 requests, which could be crafted to
+	    modify already freed memory. [...] We think it might be triggered
+	    remotely, but we do not think it could be used to execute remote
+	    code.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-0934</cvename>
+      <url>https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html</url>
+    </references>
+    <dates>
+      <discovery>2022-03-31</discovery>
+      <entry>2022-04-03</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="83466f76-aefe-11ec-b4b6-d05099c0c059">
     <topic>gitea -- Open Redirect on login</topic>
     <affects>