Date: Wed, 2 Dec 2020 10:03:10 +0000 (UTC) From: Philip Paeps <philip@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r556809 - head/security/vuxml Message-ID: <202012021003.0B2A3A7k045288@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: philip Date: Wed Dec 2 10:03:09 2020 New Revision: 556809 URL: https://svnweb.freebsd.org/changeset/ports/556809 Log: security/vuxml: add FreeBSD SA-20:31.icmp6 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Dec 2 09:25:07 2020 (r556808) +++ head/security/vuxml/vuln.xml Wed Dec 2 10:03:09 2020 (r556809) @@ -58,6 +58,43 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8eed0c5c-3482-11eb-b87a-901b0ef719ab"> + <topic>FreeBSD -- ICMPv6 use-after-free in error message handling</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>12.2</ge><lt>12.2_1</lt></range> + <range><ge>12.1</ge><lt>12.1_11</lt></range> + <range><ge>11.4</ge><lt>11.4_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>When an ICMPv6 error message is received, the FreeBSD ICMPv6 stack + may extract information from the message to hand to upper-layer + protocols. As a part of this operation, it may parse IPv6 header + options from a packet embedded in the ICMPv6 message.</p> + <p>The handler for a routing option caches a pointer into the packet + buffer holding the ICMPv6 message. However, when processing + subsequent options the packet buffer may be freed, rendering the + cached pointer invalid. The network stack may later dereference the + pointer, potentially triggering a use-after-free.</p> + <h1>Impact:</h1> + <p>A remote host may be able to trigger a read of freed kernel memory. + This may trigger a kernel panic if the address had been unmapped.</p> + </body> + </description> + <references> + <cvename>CVE-2020-7469</cvename> + <freebsdsa>SA-20:31.icmp6</freebsdsa> + </references> + <dates> + <discovery>2020-12-01</discovery> + <entry>2020-12-02</entry> + </dates> + </vuln> + <vuln vid="76c8b690-340b-11eb-a2b7-54e1ad3d6335"> <topic>xorg-server -- Multiple input validation failures in X server XKB extension</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202012021003.0B2A3A7k045288>