From owner-svn-ports-head@freebsd.org Thu Oct 24 17:08:54 2019 Return-Path: Delivered-To: svn-ports-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 8E105174234; Thu, 24 Oct 2019 17:08:54 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46zYcQ36kPz4Fb1; Thu, 24 Oct 2019 17:08:54 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 49D30195BC; Thu, 24 Oct 2019 17:08:54 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x9OH8spX022701; Thu, 24 Oct 2019 17:08:54 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x9OH8rub022700; Thu, 24 Oct 2019 17:08:53 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201910241708.x9OH8rub022700@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Thu, 24 Oct 2019 17:08:53 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r515493 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: feld X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 515493 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Oct 2019 17:08:54 -0000 Author: feld Date: Thu Oct 24 17:08:53 2019 New Revision: 515493 URL: https://svnweb.freebsd.org/changeset/ports/515493 Log: Add missing FreeBSD SAs Security: FreeBSD-SA-19:24.mqueuefs Security: FreeBSD-SA-19:23.midi Security: FreeBSD-SA-19:22.mbuf Security: FreeBSD-SA-19:21.bhyve Security: FreeBSD-SA-19:20.bsnmp Security: FreeBSD-SA-19:19.mldv2 Security: FreeBSD-SA-19:18.bzip2 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Oct 24 17:05:56 2019 (r515492) +++ head/security/vuxml/vuln.xml Thu Oct 24 17:08:53 2019 (r515493) @@ -58,6 +58,261 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + FreeBSD -- Reference count overflow in mqueue filesystem 32-bit compat + + + FreeBSD-kernel + 12.012.0_10 + 11.311.3_3 + 11.211.2_14 + + + + +

Problem Description:

+

System calls operating on file descriptors obtain a + reference to relevant struct file which due to a programming + error was not always put back, which in turn could be used + to overflow the counter of affected struct file.

+

Impact:

+

A local user can use this flaw to obtain access to files, + directories, sockets, etc., opened by processes owned by + other users. If obtained struct file represents a directory + from outside of user's jail, it can be used to access files + outside of the jail. If the user in question is a jailed + root they can obtain root privileges on the host system.

+ +
+ + CVE-2019-5603 + SA-19:24.mqueuefs + + + 2019-08-20 + 2019-10-24 + +
+ + + FreeBSD -- kernel memory disclosure from /dev/midistat + + + FreeBSD-kernel + 12.012.0_10 + 11.311.3_3 + 11.211.2_14 + + + + +

Problem Description:

+

The kernel driver for /dev/midistat implements a handler + for read(2). This handler is not thread-safe, and a + multi-threaded program can exploit races in the handler to + cause it to copy out kernel memory outside the boundaries + of midistat's data buffer.

+

Impact:

+

The races allow a program to read kernel memory within + a 4GB window centered at midistat's data buffer. The buffer + is allocated each time the device is opened, so an attacker + is not limited to a static 4GB region of memory.

+

On 32-bit platforms, an attempt to trigger the race may + cause a page fault in kernel mode, leading to a panic.

+ +
+ + CVE-2019-5612 + SA-19:23.midi + + + 2019-08-20 + 2019-10-24 + +
+ + + FreeBSD -- IPv6 remote Denial-of-Service + + + FreeBSD-kernel + 12.012.0_10 + 11.311.3_3 + 11.211.2_14 + + + + +

Problem Description:

+

Due do a missing check in the code of m_pulldown(9) data + returned may not be contiguous as requested by the caller.

+

Impact:

+

Extra checks in the IPv6 code catch the error condition + and trigger a kernel panic leading to a remote DoS + (denial-of-service) attack with certain Ethernet interfaces. + At this point it is unknown if any other than the IPv6 code + paths can trigger a similar condition.

+ +
+ + CVE-2019-5611 + SA-19:22.mbuf + + + 2019-08-20 + 2019-10-24 + +
+ + + FreeBSD -- Insufficient validation of guest-supplied data (e1000 device) + + + FreeBSD-kernel + 12.012.0_9 + 11.311.3_2 + 11.211.2_13 + + + + +

Problem Description:

+

The e1000 network adapters permit a variety of modifications + to an Ethernet packet when it is being transmitted. These + include the insertion of IP and TCP checksums, insertion + of an Ethernet VLAN header, and TCP segmentation offload + ("TSO"). The e1000 device model uses an on-stack buffer to + generate the modified packet header when simulating these + modifications on transmitted packets.

+

When TCP segmentation offload is requested for a transmitted + packet, the e1000 device model used a guest-provided value + to determine the size of the on-stack buffer without + validation. The subsequent header generation could overflow + an incorrectly sized buffer or indirect a pointer composed + of stack garbage.

+

Impact:

+

A misbehaving bhyve guest could overwrite memory in the + bhyve process on the host.

+ +
+ + CVE-2019-5609 + SA-19:21.bhyve + + + 2019-08-06 + 2019-10-24 + +
+ + + FreeBSD -- Insufficient message length validation in bsnmp library + + + FreeBSD + 12.012.0_9 + 11.311.3_2 + 11.211.2_13 + + + + +

Problem Description:

+

A function extracting the length from type-length-value + encoding is not properly validating the submitted length.

+

Impact:

+

A remote user could cause, for example, an out-of-bounds + read, decoding of unrelated data, or trigger a crash of the + software such as bsnmpd resulting in a denial of service.

+ +
+ + CVE-2019-5610 + SA-19:20.bsnmp + + + 2019-08-06 + 2019-10-24 + +
+ + + FreeBSD -- ICMPv6 / MLDv2 out-of-bounds memory access + + + FreeBSD-kernel + 12.012.0_9 + 11.311.3_2 + 11.211.2_13 + + + + +

Problem Description:

+

The ICMPv6 input path incorrectly handles cases where + an MLDv2 listener query packet is internally fragmented + across multiple mbufs.

+

Impact:

+

A remote attacker may be able to cause an out-of-bounds + read or write that may cause the kernel to attempt to access + an unmapped page and subsequently panic.

+ +
+ + CVE-2019-5608 + SA-19:19.mldv2 + + + 2019-08-06 + 2019-10-24 + +
+ + + FreeBSD -- Multiple vulnerabilities in bzip2 + + + FreeBSD + 12.012.0_9 + 11.311.3_2 + 11.211.2_13 + + + + +

Problem Description:

+

The decompressor used in bzip2 contains a bug which can + lead to an out-of-bounds write when processing a specially + crafted bzip2(1) file.

+

bzip2recover contains a heap use-after-free bug which + can be triggered when processing a specially crafted bzip2(1) + file.

+

Impact:

+

An attacker who can cause maliciously crafted input to + be processed may trigger either of these bugs. The bzip2recover + bug may cause a crash, permitting a denial-of-service. The + bzip2 decompressor bug could potentially be exploited to + execute arbitrary code.

+

Note that some utilities, including the tar(1) archiver + and the bspatch(1) binary patching utility (used in portsnap(8) + and freebsd-update(8)) decompress bzip2(1)-compressed data + internally; system administrators should assume that their + systems will at some point decompress bzip2(1)-compressed + data even if they never explicitly invoke the bunzip2(1) + utility.

+ +
+ + CVE-2016-3189 + CVE-2019-1290 + SA-19:18.bzip2 + + + 2019-08-06 + 2019-10-24 + +
+ varnish -- Information Disclosure Vulnerability