Date: Thu, 19 Sep 2013 05:44:02 +0000 (UTC) From: Remko Lodder <remko@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r327595 - head/security/vuxml Message-ID: <201309190544.r8J5i26Q034018@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: remko (src,doc committer) Date: Thu Sep 19 05:44:02 2013 New Revision: 327595 URL: http://svnweb.freebsd.org/changeset/ports/327595 Log: Add the latest two FreeBSD Security Advisories that have impact on -RELEASE versions. (RC's are not documented). Hat: secteam Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Sep 19 05:17:52 2013 (r327594) +++ head/security/vuxml/vuln.xml Thu Sep 19 05:44:02 2013 (r327595) @@ -51,6 +51,94 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b72bad1c-20ed-11e3-be06-000c29ee3065"> + <topic>FreeBSD -- Cross-mount links between nullfs(5) mounts</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><gt>9.1</gt><lt>9.1_7</lt></range> + <range><gt>8.4</gt><lt>8.4_4</lt></range> + <range><gt>8.3</gt><lt>8.3_11</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Problem Description:</p> + <p>The nullfs(5) implementation of the VOP_LINK(9) VFS + operation does not check whether the source and target of + the link are both in the same nullfs instance. It is + therefore possible to create a hardlink from a location in + one nullfs instance to a file in another, as long as the + underlying (source) filesystem is the same.</p> + <p>Impact:</p> + <p>If multiple nullfs views into the same filesystem are + mounted in different locations, a user with read access to + one of these views and write access to another will be able + to create a hard link from the latter to a file in the + former, even though they are, from the user's perspective, + different filesystems. The user may thereby gain write + access to files which are nominally on a read-only + filesystem.</p> + </body> + </description> + <references> + <cvename>CVE-2013-5710</cvename> + <freebsdsa>SA-13:13.nullfs</freebsdsa> + </references> + <dates> + <discovery>2013-09-10</discovery> + <entry>2013-09-19</entry> + </dates> + </vuln> + + <vuln vid="4d87d357-202c-11e3-be06-000c29ee3065"> + <topic>FreeBSD -- Insufficient credential checks in network ioctl(2)</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><gt>9.1</gt><lt>9.1_7</lt></range> + <range><gt>8.4</gt><lt>8.4_4</lt></range> + <range><gt>8.3</gt><lt>8.3_11</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Problem Description:</p> + <p>As is commonly the case, the IPv6 and ATM network layer + ioctl request handlers are written in such a way that an + unrecognized request is passed on unmodified to the link + layer, which will either handle it or return an error + code.</p> + <p>Network interface drivers, however, assume that the + SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and + SIOCSIFNETMASK requests have been handled at the network + layer, and therefore do not perform input validation or + verify the caller's credentials. Typical link-layer actions + for these requests may include marking the interface as "up" + and resetting the underlying hardware.</p> + <p>Impact:</p> + <p>An unprivileged user with the ability to run arbitrary code + can cause any network interface in the system to perform the + link layer actions associated with a SIOCSIFADDR, + SIOCSIFBRDADDR, SIOCSIFDSTADDR or SIOCSIFNETMASK ioctl + request; or trigger a kernel panic by passing a specially + crafted address structure which causes a network interface + driver to dereference an invalid pointer.</p> + <p>Although this has not been confirmed, the possibility that + an attacker may be able to execute arbitrary code in kernel + context can not be ruled out.</p> + </body> + </description> + <references> + <cvename>CVE-2013-5691</cvename> + <freebsdsa>SA-13:12.ifioctl</freebsdsa> + </references> + <dates> + <discovery>2013-09-10</discovery> + <entry>2013-09-19</entry> + </dates> + </vuln> + <vuln vid="7dfed67b-20aa-11e3-b8d8-0025905a4771"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> @@ -215,10 +303,12 @@ Note: Please add new entries to the beg </description> <references> <cvename>CVE-2013-4315</cvename> + <url>https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/</url> </references> <dates> <discovery>2013-09-10</discovery> <entry>2013-09-12</entry> + <modified>2013-09-18</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201309190544.r8J5i26Q034018>