svn commit: r419975 - head/security/vuxml
Mark Felder
feld at FreeBSD.org
Tue Aug 9 22:25:54 UTC 2016
Author: feld
Date: Tue Aug 9 22:25:52 2016
New Revision: 419975
URL: https://svnweb.freebsd.org/changeset/ports/419975
Log:
Add missing FreeBSD SA vuxml entries for 2013
Entries that only affected BETA/RC releases were ignored
Security: SA-13:10.sctp
Security: SA-13:09.ip_multicast
Security: SA-13:08.nfsserver
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Aug 9 21:41:25 2016 (r419974)
+++ head/security/vuxml/vuln.xml Tue Aug 9 22:25:52 2016 (r419975)
@@ -58,6 +58,106 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8">
+ <topic>FreeBSD -- Kernel memory disclosure in sctp(4)</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>9.1</ge><lt>9.1_6</lt></range>
+ <range><ge>8.4</ge><lt>8.4_3</lt></range>
+ <range><ge>8.3</ge><lt>8.3_10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem Description:</p>
+ <p>When initializing the SCTP state cookie being sent in INIT-ACK chunks,
+ a buffer allocated from the kernel stack is not completely initialized.</p>
+ <p>Impact:</p>
+ <p>Fragments of kernel memory may be included in SCTP packets and
+ transmitted over the network. For each SCTP session, there are two
+ separate instances in which a 4-byte fragment may be transmitted.</p>
+ <p>This memory might contain sensitive information, such as portions of the
+ file cache or terminal buffers. This information might be directly
+ useful, or it might be leveraged to obtain elevated privileges in
+ some way. For example, a terminal buffer might include a user-entered
+ password.</p>
+ </body>
+ </description>
+ <references>
+ <freebsdsa>SA-13:10.sctp</freebsdsa>
+ <cvename>CVE-2013-5209</cvename>
+ </references>
+ <dates>
+ <discovery>2013-08-22</discovery>
+ <entry>2016-08-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0844632f-5e78-11e6-a6c3-14dae9d210b8">
+ <topic>FreeBSD -- integer overflow in IP_MSFILTER</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>9.1</ge><lt>9.1_6</lt></range>
+ <range><ge>8.4</ge><lt>8.4_3</lt></range>
+ <range><ge>8.3</ge><lt>8.3_10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem Description:</p>
+ <p>An integer overflow in computing the size of a temporary
+ buffer can result in a buffer which is too small for the requested
+ operation.</p>
+ <p>Impact:</p>
+ <p>An unprivileged process can read or write pages of memory
+ which belong to the kernel. These may lead to exposure of sensitive
+ information or allow privilege escalation.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-3077</cvename>
+ <freebsdsa>SA-13:09.ip_multicast</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2013-08-22</discovery>
+ <entry>2016-08-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e5d2442d-5e76-11e6-a6c3-14dae9d210b8">
+ <topic>FreeBSD -- Incorrect privilege validation in the NFS server</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>9.1</ge><lt>9.1_5</lt></range>
+ <range><ge>8.3</ge><lt>8.3_9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem Description:</p>
+ <p>The kernel incorrectly uses client supplied credentials
+ instead of the one configured in exports(5) when filling out the
+ anonymous credential for a NFS export, when -network or -host
+ restrictions are used at the same time.</p>
+ <p>Impact:</p>
+ <p>The remote client may supply privileged credentials (e.g. the
+ root user) when accessing a file under the NFS share, which will bypass
+ the normal access checks.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-4851</cvename>
+ <freebsdsa>SA-13:08.nfsserver</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2013-07-06</discovery>
+ <entry>2016-08-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6da45e38-5b55-11e6-8859-000c292ee6b8">
<topic>collectd -- Network plugin heap overflow</topic>
<affects>
More information about the svn-ports-all
mailing list