diff options
author | Danilo G. Baio <dbaio@FreeBSD.org> | 2021-05-25 23:05:22 +0000 |
---|---|---|
committer | Danilo G. Baio <dbaio@FreeBSD.org> | 2021-05-26 00:33:57 +0000 |
commit | b48ef2625f60a360d0c7618d1650a7dd9155b89b (patch) | |
tree | 1d8f8229685727872381523a6afe6e0a00203573 | |
parent | d4b12827cc2d1557b1d253ad9308b5c72f40bcf0 (diff) |
security/vuxml: Document net/libzmq4 issues
PR: 255102
Reported by: Thomas Petig <thomas@petig.eu>
Security: CVE-2019-13132
Security: CVE-2020-15166
-rw-r--r-- | security/vuxml/vuln.xml | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1d575fd1cacd..23bff9bd9ddd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,73 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="21ec4428-bdaa-11eb-a04e-641c67a117d8"> + <topic>libzmq4 -- Denial of Service</topic> + <affects> + <package> + <name>libzmq4</name> + <range><lt>4.3.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google's oss-fuzz project reports:</p> + <blockquote cite="https://github.com/zeromq/libzmq/releases/tag/v4.3.3"> + <p>Denial-of-Service on CURVE/ZAP-protected servers by + unauthenticated clients. + If a raw TCP socket is opened and connected to an endpoint that is fully + configured with CURVE/ZAP, legitimate clients will not be able to exchange + any message. Handshakes complete successfully, and messages are delivered to + the library, but the server application never receives them.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-15166</cvename> + <url>https://github.com/zeromq/libzmq/releases/tag/v4.3.3</url> + <url>https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m</url> + <freebsdpr>ports/255102</freebsdpr> + </references> + <dates> + <discovery>2020-09-07</discovery> + <entry>2021-05-25</entry> + </dates> + </vuln> + + <vuln vid="6954a2b0-bda8-11eb-a04e-641c67a117d8"> + <topic>libzmq4 -- Stack overflow</topic> + <affects> + <package> + <name>libzmq4</name> + <range><lt>4.3.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Fang-Pen Lin reports:</p> + <blockquote cite="https://github.com/zeromq/libzmq/releases/tag/v4.3.2"> + <p>A remote, unauthenticated client connecting to a + libzmq application, running with a socket listening with CURVE + encryption/authentication enabled, may cause a stack overflow and + overwrite the stack with arbitrary data, due to a buffer overflow in + the library. Users running public servers with the above configuration + are highly encouraged to upgrade as soon as possible, as there are no + known mitigations.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2019-13132</cvename> + <url>https://github.com/zeromq/libzmq/releases/tag/v4.3.2</url> + <url>https://github.com/zeromq/libzmq/issues/3558</url> + <freebsdpr>ports/255102</freebsdpr> + </references> + <dates> + <discovery>2019-06-27</discovery> + <entry>2021-05-25</entry> + </dates> + </vuln> + <vuln vid="0882f019-bd60-11eb-9bdd-8c164567ca3c"> <topic>NGINX -- 1-byte memory overwrite in resolver</topic> <affects> |