Date: Fri, 14 Feb 2020 01:16:13 +0000 (UTC) From: Philip Paeps <philip@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r526079 - head/security/vuxml Message-ID: <202002140116.01E1GDgR068844@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: philip Date: Fri Feb 14 01:16:13 2020 New Revision: 526079 URL: https://svnweb.freebsd.org/changeset/ports/526079 Log: security/vuxml: Add January FreeBSD SAs SA-20:01.libfetch SA-20:02.ipsec SA-20:03.thrmisc PR: 243702 Submitted by: Miroslav Lachman <000.fbsd@quip.cz> Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Feb 14 00:38:49 2020 (r526078) +++ head/security/vuxml/vuln.xml Fri Feb 14 01:16:13 2020 (r526079) @@ -58,6 +58,96 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6025d173-4279-11ea-b184-f8b156ac3ff9"> + <topic>FreeBSD -- kernel stack data disclosure</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>12.1</ge><lt>12.1_2</lt></range> + <range><ge>12.0</ge><lt>12.0_13</lt></range> + <range><ge>11.3</ge><lt>11.3_6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>Due to incorrect initialization of a stack data structure, up to 20 + bytes of kernel data stored previously stored on the stack will be + exposed to a crashing user process.</p> + <h1>Impact:</h1> + <p>Sensitive kernel data may be disclosed.</p> + </body> + </description> + <references> + <cvename>CVE-2019-15875</cvename> + <freebsdsa>SA-20:03.thrmisc</freebsdsa> + </references> + <dates> + <discovery>2020-01-28</discovery> + <entry>2020-01-29</entry> + </dates> + </vuln> + + <vuln vid="5797c807-4279-11ea-b184-f8b156ac3ff9"> + <topic>FreeBSD -- Missing IPsec anti-replay window check</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>12.0</ge><lt>12.0_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A missing check means that an attacker can reinject an old packet and + it will be accepted and processed by the IPsec endpoint.</p> + <h1>Impact:</h1> + <p>The impact depends on the higher-level protocols in use over IPsec. + For example, an attacker who can capture and inject packets could + cause an action that was intentionally performed once to be repeated.</p> + </body> + </description> + <references> + <cvename>CVE-2019-5613</cvename> + <freebsdsa>SA-20:02.ipsec</freebsdsa> + </references> + <dates> + <discovery>2020-01-28</discovery> + <entry>2020-01-29</entry> + </dates> + </vuln> + + <vuln vid="22b41bc5-4279-11ea-b184-f8b156ac3ff9"> + <topic>FreeBSD -- libfetch buffer overflow</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>12.1</ge><lt>12.1_2</lt></range> + <range><ge>12.0</ge><lt>12.0_13</lt></range> + <range><ge>11.3</ge><lt>11.3_6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A programming error allows an attacker who can specify a URL with a + username and/or password components to overflow libfetch(3) buffers.</p> + <h1>Impact:</h1> + <p>An attacker in control of the URL to be fetched (possibly via HTTP + redirect) may cause a heap buffer overflow, resulting in program + misbehavior or malicious code execution.</p> + </body> + </description> + <references> + <cvename>CVE-2020-7450</cvename> + <freebsdsa>SA-20:01.libfetch</freebsdsa> + </references> + <dates> + <discovery>2020-01-28</discovery> + <entry>2020-01-29</entry> + </dates> + </vuln> + <vuln vid="1ece5591-4ea9-11ea-86f0-001b217b3468"> <topic>Gitlab -- Vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202002140116.01E1GDgR068844>