Date: Sun, 29 May 2016 09:46:32 +0000 (UTC) From: Olli Hauer <ohauer@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r416090 - head/security/vuxml Message-ID: <201605290946.u4T9kWbm078858@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: ohauer Date: Sun May 29 09:46:32 2016 New Revision: 416090 URL: https://svnweb.freebsd.org/changeset/ports/416090 Log: - document openvswitch CVE-2016-2074 PR: 208404 Submitted by: ohauer Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun May 29 08:55:41 2016 (r416089) +++ head/security/vuxml/vuln.xml Sun May 29 09:46:32 2016 (r416090) @@ -58,6 +58,42 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b53bbf58-257f-11e6-9f4d-20cf30e32f6d"> + <topic>openvswitch -- MPLS buffer overflow</topic> + <affects> + <package> + <name>openvswitch</name> + <range><le>2.3.2_1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Open vSwitch reports:</p> + <blockquote cite="http://openvswitch.org/pipermail/announce/2016-March/000082.html"> + <p>Multiple versions of Open vSwitch are vulnerable to remote buffer + overflow attacks, in which crafted MPLS packets could overflow the + buffer reserved for MPLS labels in an OVS internal data structure. + The MPLS packets that trigger the vulnerability and the potential for + exploitation vary depending on version:</p> + <p>Open vSwitch 2.1.x and earlier are not vulnerable.</p> + <p>In Open vSwitch 2.2.x and 2.3.x, the MPLS buffer overflow can be + exploited for arbitrary remote code execution.</p> + <p>In Open vSwitch 2.4.x, the MPLS buffer overflow does not obviously lead + to a remote code execution exploit, but testing shows that it can allow a + remote denial of service. See the mitigation section for details.</p> + <p>Open vSwitch 2.5.x is not vulnerable.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-2074</cvename> + </references> + <dates> + <discovery>2016-03-28</discovery> + <entry>2016-05-29</entry> + </dates> + </vuln> + <vuln vid="1a6bbb95-24b8-11e6-bd31-3065ec8fd3ec"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605290946.u4T9kWbm078858>