diff options
| -rw-r--r-- | security/vuxml/vuln.xml | 29 | 
1 files changed, 29 insertions, 0 deletions
| diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b4b73d2ca202..aef73f919691 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,35 @@ Notes:    * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)  -->  <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> +  <vuln vid="108a4be3-e612-11e9-9963-5f1753e0aca0"> +    <topic>unbound -- parsing vulnerability</topic> +    <affects> +      <package> +	<name>unbound</name> +	<range><ge>1.7.1</ge><lt>1.9.4</lt></range> +      </package> +    </affects> +    <description> +      <body xmlns="http://www.w3.org/1999/xhtml"> +	<p>Unbound Security Advisories:</p> +	<blockquote cite="https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries"> +	  <p>Due to an error in parsing NOTIFY queries, it is possible for Unbound +	    to continue processing malformed queries and may ultimately result in a +	    pointer dereference in uninitialized memory. This results in a crash of +	    the Unbound daemon.</p> +	</blockquote> +      </body> +    </description> +    <references> +      <url>https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries</url> +      <cvename>CVE-2019-16866</cvename> +    </references> +    <dates> +      <discovery>2019-10-03</discovery> +      <entry>2019-10-03</entry> +    </dates> +  </vuln> +    <vuln vid="f7fcb75c-e537-11e9-863e-b9b7af01ba9e">      <topic>ruby -- multiple vulnerabilities</topic>      <affects> | 
