This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-25 07:15:41 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
e4133d8b-ab33-451a-bc68-3719de73d54a | routinator -- potential DOS attack Due to a mistake in error handling, data in RRDP snapshot and delta files that isnâÂÂt correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data. We are not aware of exploitation of this vulnerability at this point in time. Starting with release 0.11.3, Routinator handles encoding errors by rejecting the snapshot or delta file and continuing with validation. In case of an invalid delta file, it will try using the snapshot instead. If a snapshot file is invalid, the update of the repository will fail and an update through rsync is attempted.
Discovery 2022-10-06 Entry 2022-10-07 routinator ge 0.9.0 lt 0.11.3 CVE-2022-3029 https://nlnetlabs.nl/downloads/routinator/CVE-2022-3029.txt |
11982747-544c-11ee-ac3e-a04a5edf46d9 | routinator -- multiple vulnerabilities NLnet Labs report:
Discovery 2022-12-08 Entry 2023-09-16 routinator < 0.12.2 CVE-2022-39915 https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt CVE-2022-39916 https://nlnetlabs.nl/downloads/routinator/CVE-2023-39916.txt |
ea9d1fd2-5d24-11ee-8507-b42e991fc52e | routinator -- Possible path traversal when storing RRDP responses sep@nlnetlabs.nl reports:
Discovery 2023-09-13 Entry 2023-09-27 routinator ge 0.9.0 lt 0.12.2 CVE-2023-39916 https://nvd.nist.gov/vuln/detail/CVE-2023-39916 |