Document unbound vulnerability

This commit is contained in:
Sunpoet Po-Chuan Hsieh
2019-10-03 19:28:42 +00:00
parent f1a183778e
commit 202f2ee62f

View File

@@ -58,6 +58,35 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="108a4be3-e612-11e9-9963-5f1753e0aca0">
<topic>unbound -- parsing vulnerability</topic>
<affects>
<package>
<name>unbound</name>
<range><ge>1.7.1</ge><lt>1.9.4</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Unbound Security Advisories:</p>
<blockquote cite="https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries">
<p>Due to an error in parsing NOTIFY queries, it is possible for Unbound
to continue processing malformed queries and may ultimately result in a
pointer dereference in uninitialized memory. This results in a crash of
the Unbound daemon.</p>
</blockquote>
</body>
</description>
<references>
<url>https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries</url>
<cvename>CVE-2019-16866</cvename>
</references>
<dates>
<discovery>2019-10-03</discovery>
<entry>2019-10-03</entry>
</dates>
</vuln>
<vuln vid="f7fcb75c-e537-11e9-863e-b9b7af01ba9e">
<topic>ruby -- multiple vulnerabilities</topic>
<affects>