- Document www/varnish6 vulnerability
This commit is contained in:
parent
b4a62db929
commit
bf64057171
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=510946
1 changed files with 26 additions and 0 deletions
|
@ -58,6 +58,32 @@ Notes:
|
|||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="ce231189-ce56-11e9-9fa0-0050569f0b83">
|
||||
<topic>www/varnish6 -- Denial of Service</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>varnish6</name>
|
||||
<range><lt>6.2.1</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>The Varnish Team reports:</p>
|
||||
<blockquote cite="https://varnish-cache.org/security/VSV00003.html">
|
||||
<p>A failure in HTTP/1 parsing can allow a remote attacker to trigger
|
||||
an assertion in varnish, restarting the daemon and clearing the cache.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://varnish-cache.org/security/VSV00003.html</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2019-09-02</discovery>
|
||||
<entry>2019-09-03</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="c9c6c2f8-cd54-11e9-af89-080027ef1a23">
|
||||
<topic>libgcrypt -- ECDSA timing attack</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Reference in a new issue