svn commit: r367938 - head/security/vuxml
Brad Davis
brd at FreeBSD.org
Thu Sep 11 14:09:44 UTC 2014
Author: brd (doc committer)
Date: Thu Sep 11 14:09:43 2014
New Revision: 367938
URL: http://svnweb.freebsd.org/changeset/ports/367938
QAT: https://qat.redports.org/buildarchive/r367938/
Log:
Document CVE-2014-5284 affecting security/ossec-hids-* < 2.8.1.
Reviewed by: zi@
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Sep 11 14:00:41 2014 (r367937)
+++ head/security/vuxml/vuln.xml Thu Sep 11 14:09:43 2014 (r367938)
@@ -57,6 +57,38 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="36858e78-3963-11e4-ad84-000c29f6ae42">
+ <topic>security/ossec-hids-* -- root escalation via temp files</topic>
+ <affects>
+ <package>
+ <name>ossec-hids-server</name>
+ <name>ossec-hids-client</name>
+ <name>ossec-hids-local</name>
+ <range><lt>2.8.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>OSSEC reports:</p>
+ <blockquote cite="http://www.ossec.net/?p=1135">
+ <p>This correction will create the temp file for the hosts deny file
+ in /var/ossec and will use mktemp where available to create
+ NON-predictable temp file name. In cases where mktemp is not
+ available we have written a BAD version of mktemp, but should be a
+ little better then just process id.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-5284</cvename>
+ <url>http://www.ossec.net/?p=1135</url>
+ </references>
+ <dates>
+ <discovery>2014-09-09</discovery>
+ <entry>2014-09-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="36a415c8-3867-11e4-b522-00262d5ed8ee">
<topic>www/chromium -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list