- Document www/varnish6 vulnerability

This commit is contained in:
Ryan Steinmetz 2019-09-03 14:33:02 +00:00
parent b4a62db929
commit bf64057171
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=510946

View file

@ -58,6 +58,32 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="ce231189-ce56-11e9-9fa0-0050569f0b83">
<topic>www/varnish6 -- Denial of Service</topic>
<affects>
<package>
<name>varnish6</name>
<range><lt>6.2.1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The Varnish Team reports:</p>
<blockquote cite="https://varnish-cache.org/security/VSV00003.html">
<p>A failure in HTTP/1 parsing can allow a remote attacker to trigger
an assertion in varnish, restarting the daemon and clearing the cache.</p>
</blockquote>
</body>
</description>
<references>
<url>https://varnish-cache.org/security/VSV00003.html</url>
</references>
<dates>
<discovery>2019-09-02</discovery>
<entry>2019-09-03</entry>
</dates>
</vuln>
<vuln vid="c9c6c2f8-cd54-11e9-af89-080027ef1a23">
<topic>libgcrypt -- ECDSA timing attack</topic>
<affects>