Date: Fri, 8 Jan 2016 01:31:32 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r405502 - head/security/vuxml Message-ID: <201601080131.u081VWlA030732@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Fri Jan 8 01:31:32 2016 New Revision: 405502 URL: https://svnweb.freebsd.org/changeset/ports/405502 Log: Document two dhcpcd vulnerabilities PR: 206015 Security: CVE-2016-1504 Security: CVE-2016-1503 Security: https://vuxml.FreeBSD.org/freebsd/df587aa2-b5a5-11e5-9728-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jan 8 01:30:55 2016 (r405501) +++ head/security/vuxml/vuln.xml Fri Jan 8 01:31:32 2016 (r405502) @@ -58,6 +58,40 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="df587aa2-b5a5-11e5-9728-002590263bf5"> + <topic>dhcpcd -- multiple vulnerabilities</topic> + <affects> + <package> + <name>dhcpcd</name> + <range><lt>6.10.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Nico Golde reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2016/01/07/3"> + <p>heap overflow via malformed dhcp responses later in print_option + (via dhcp_envoption1) due to incorrect option length values. + Exploitation is non-trivial, but I'd love to be proven wrong.</p> + <p>invalid read/crash via malformed dhcp responses. not exploitable + beyond DoS as far as I can judge.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-1503</cvename> + <cvename>CVE-2016-1504</cvename> + <freebsdpr>ports/206015</freebsdpr> + <url>http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30</url> + <url>http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403</url> + <url>http://www.openwall.com/lists/oss-security/2016/01/07/3</url> + </references> + <dates> + <discovery>2016-01-04</discovery> + <entry>2016-01-08</entry> + </dates> + </vuln> + <vuln vid="4084168e-b531-11e5-a98c-0011d823eebd"> <topic>mbedTLS/PolarSSL -- SLOTH attack on TLS 1.2 server authentication</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601080131.u081VWlA030732>