From owner-svn-ports-head@FreeBSD.ORG Fri Apr 11 21:33:42 2014
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id DCB65470;
Fri, 11 Apr 2014 21:33:41 +0000 (UTC)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id C977010D3;
Fri, 11 Apr 2014 21:33:41 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s3BLXf8t059007;
Fri, 11 Apr 2014 21:33:41 GMT (envelope-from zi@svn.freebsd.org)
Received: (from zi@localhost)
by svn.freebsd.org (8.14.8/8.14.8/Submit) id s3BLXfld059003;
Fri, 11 Apr 2014 21:33:41 GMT (envelope-from zi@svn.freebsd.org)
Message-Id: <201404112133.s3BLXfld059003@svn.freebsd.org>
From: Ryan Steinmetz
Date: Fri, 11 Apr 2014 21:33:41 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r351044 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Fri, 11 Apr 2014 21:33:42 -0000
Author: zi
Date: Fri Apr 11 21:33:41 2014
New Revision: 351044
URL: http://svnweb.freebsd.org/changeset/ports/351044
QAT: https://qat.redports.org/buildarchive/r351044/
Log:
- Move CVE-2014-0076 to its own entry+add FreeBSD system information as the affected list does not 100% line up with the vulnerability described in CVE-2014-0160/5631ae98-be9e-11e3-b5e3-c80aa9043978
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Apr 11 21:26:20 2014 (r351043)
+++ head/security/vuxml/vuln.xml Fri Apr 11 21:33:41 2014 (r351044)
@@ -51,6 +51,48 @@ Note: Please add new entries to the beg
-->
+
+ OpenSSL -- Local Information Disclosure
+
+
+ openssl
+ 1.0.11.0.1_10
+
+
+ mingw32-openssl
+ 1.0.11.0.1g
+
+
+ FreeBSD
+ 8.38.3_15
+ 8.48.4_8
+ 9.19.1_11
+ 9.29.2_4
+ 10.010.0_1
+
+
+
+
+ OpenSSL reports:
+
+ A flaw in the implementation of Montgomery Ladder Approach would
+ create a side-channel that leaks sensitive timing information.
+ A local attacker might be able to snoop a signing process and
+ might recover the signing key from it.
+
+
+
+
+ CVE-2014-0076
+ FreeBSD-SA-14:06.openssl
+ https://www.openssl.org/news/vulnerabilities.html#2014-0076
+
+
+ 2014-04-07
+ 2014-04-11
+
+
+
openafs -- Denial of Service
@@ -152,7 +194,7 @@ Note: Please add new entries to the beg
- OpenSSL -- Multiple vulnerabilities - private data exposure
+ OpenSSL -- Remote Information Disclosure
openssl
@@ -185,16 +227,15 @@ Note: Please add new entries to the beg
communications, steal data directly from the services and users and
to impersonate services and users.
- This also covers:
-
- Fix for the attack described in the paper "Recovering OpenSSL
- ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
+
+ The code used to handle the Heartbeat Extension does not do
+ sufficient boundary checks on record length, which allows reading
+ beyond the actual payload.