From owner-svn-ports-head@freebsd.org Tue May 12 18:37:02 2020 Return-Path: Delivered-To: svn-ports-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id E91D82F7646; Tue, 12 May 2020 18:37:02 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 49M63L5xzkz4d1V; Tue, 12 May 2020 18:37:02 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C6D5AC891; Tue, 12 May 2020 18:37:02 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 04CIb2f2026417; Tue, 12 May 2020 18:37:02 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 04CIb2SR026416; Tue, 12 May 2020 18:37:02 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <202005121837.04CIb2SR026416@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Tue, 12 May 2020 18:37:02 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r535002 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 535002 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 12 May 2020 18:37:03 -0000 Author: gordon (src committer) Date: Tue May 12 18:37:02 2020 New Revision: 535002 URL: https://svnweb.freebsd.org/changeset/ports/535002 Log: Add data for today's SA batch. Approved by: so Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue May 12 18:15:06 2020 (r535001) +++ head/security/vuxml/vuln.xml Tue May 12 18:37:02 2020 (r535002) @@ -58,6 +58,160 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + FreeBSD -- Insufficient cryptodev MAC key length check + + + FreeBSD-kernel + 12.112.1_5 + + + + +

Problem Description:

+

Requests to create cryptography sessions using a MAC did not validate the + user-supplied MAC key length. The cryptodev module allocates a buffer whose + size is this user-suppled length.

+

Impact:

+

An unprivileged process can trigger a kernel panic.

+ +
+ + CVE-2019-15879 + SA-20:15.cryptodev + + + 2020-01-20 + 2020-05-12 + +
+ + + FreeBSD -- Use after free in cryptodev module + + + FreeBSD-kernel + 12.112.1_5 + 11.311.3_9 + + + + +

Problem Description:

+

A race condition permitted a data structure in the kernel to be used + after it was freed by the cryptodev module.

+

Impact:

+

An unprivileged process can overwrite arbitrary kernel memory.

+ +
+ + CVE-2019-15879 + SA-20:15.cryptodev + + + 2020-01-20 + 2020-05-12 + +
+ + + FreeBSD -- Improper checking in SCTP-AUTH shared key update + + + FreeBSD-kernel + 11.311.3_9 + + + + +

Problem Description:

+

The SCTP layer does improper checking when an application tries to update + a shared key. Therefore an unprivileged local user can trigger a use-after- + free situation, for example by specific sequences of updating shared keys and + closing the SCTP association.

+

Impact:

+

Triggering the use-after-free situation may result in unintended kernel + behaviour including a kernel panic.

+ +
+ + CVE-2019-15878 + SA-20:14.sctp + + + 2019-09-19 + 2020-05-12 + +
+ + + FreeBSD -- Memory disclosure vulnerability in libalias + + + FreeBSD-kernel + 12.112.1_5 + 11.411.4_1 + 11.311.3_9 + + + + +

Problem Description:

+

The FTP packet handler in libalias incorrectly calculates some packet + lengths. This may result in disclosing small amounts of memory from the + kernel (for the in-kernel NAT implementation) or from the process space for + natd (for the userspace implementation).

+

Impact:

+

A malicious attacker could send specially constructed packets that exploit the + erroneous calculation allowing the attacker to disclose small amount of memory + either from the kernel (for the in-kernel NAT implementation) or from the + process space for natd (for the userspace implementation).

+ +
+ + CVE-2020-7455 + SA-20:13.libalias + + + 2020-05-12 + 2020-05-12 + +
+ + + FreeBSD -- Insufficient packet length validation in libalias + + + FreeBSD-kernel + 12.112.1_5 + 11.411.4_1 + 11.311.3_9 + + + + +

Problem Description:

+

libalias(3) packet handlers do not properly validate the packet length before + accessing the protocol headers. As a result, if a libalias(3) module does + not properly validate the packet length before accessing the protocol header, + it is possible for an out of bound read or write condition to occur.

+

Impact:

+

A malicious attacker could send specially constructed packets that exploit + the lack of validation allowing the attacker to read or write memory either + from the kernel (for the in-kernel NAT implementation) or from the process + space for natd (for the userspace implementation).

+ +
+ + CVE-2020-7454 + SA-20:12.libalias + + + 2020-05-12 + 2020-05-12 + +
+ qutebrowser -- Reloading page with certificate errors shows a green URL