Date: Thu, 30 Apr 2026 01:46:53 +0000 From: Philip Paeps <philip@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 0821906582e8 - main - security/vuxml: add FreeBSD SAs issued on 2026-04-29 Message-ID: <69f2b48d.3c280.22db5f4@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=0821906582e8c600f537b8e6d74c60ac9babdbf4 commit 0821906582e8c600f537b8e6d74c60ac9babdbf4 Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2026-04-30 01:43:58 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2026-04-30 01:43:58 +0000 security/vuxml: add FreeBSD SAs issued on 2026-04-29 FreeBSD-SA-26:12.dhclient affects all supported releases FreeBSD-SA-26:13.exec affects all supported releases FreeBSD-SA-26:14.pf affects all supported releases FreeBSD-SA-26:15.dhclient affects all supported releases FreeBSD-SA-26:16.libnv affects all supported releases FreeBSD-SA-26:17.libnv affects all supported releases --- security/vuxml/vuln/2026.xml | 204 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 204 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index b97db0d362bc..1119621b055b 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,207 @@ + <vuln vid="c3a9c5a6-4435-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- Heap overflow in libnv</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>When processing the header of an incoming message, libnv failed + to properly validate the message size.</p> + <h1>Impact:</h1> + <p>The lack of validation allows a malicious program to write + outside the bounds of a heap allocation. This can trigger a crash + or system panic, and it may be possible for an unprivileged user + to exploit the bug to elevate their privileges.</p> + </body> + </description> + <references> + <cvename>CVE-2026-35547</cvename> + <freebsdsa>SA-26:17.libnv</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + + <vuln vid="892fabf5-4435-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- Stack overflow via select() file descriptor set overflow</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>When exchanging data over a socket, libnv uses select(2) to + wait for data to arrive. However, it does not verify whether the + provided socket descriptor fits in select(2)'s file descriptor set + size limit of FD_SETSIZE (1024).</p> + <h1>Impact:</h1> + <p>An attacker who is able to force a libnv application to allocate + large file descriptors, e.g., by opening many descriptors and + executing a program which is not careful to close them upon startup, + can trigger stack corruption. If the target application is + setuid-root, then this could be used to elevate local privileges.</p> + </body> + </description> + <references> + <cvename>CVE-2026-39457</cvename> + <freebsdsa>SA-26:16.libnv</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + + <vuln vid="58acf4c5-4435-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- Remotely triggerable out-of-bounds heap write in dhclient</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>As dhclient is building an environment to pass to dhclient-script, + it may need to resize the array of string pointers. The code which + expands the array incorrectly calculates its new size when requesting + memory, resulting in a heap buffer overrun.</p> + <h1>Impact:</h1> + <p>A specially crafted packet can cause dhclient to overrun its + buffer of environment entries. This can result in a crash, but it + may be possible to leverage this bug to achieve remote code + execution.</p> + </body> + </description> + <references> + <cvename>CVE-2026-42512</cvename> + <freebsdsa>SA-26:15.dhclient</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + + <vuln vid="225ba563-4435-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- pf can overflow the stack parsing crafted SCTP packets</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>Incorrect packet validation allowed unbounded recursion parsing + SCTP chunk parameters. This can eventually result in a stack + overflow and panic.</p> + <h1>Impact:</h1> + <p>Remote attackers can craft packets which cause affected systems + to panic. This affects any system where pf is configured to process + traffic, independent of the configured ruleset.</p> + </body> + </description> + <references> + <cvename>CVE-2026-7164</cvename> + <freebsdsa>SA-26:14.pf</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + + <vuln vid="f528ea29-4434-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- Local privilege escalation via execve()</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>An operator precedence bug in the kernel results in a scenario + where a buffer overflow causes attacker-controlled data to overwrite + adjacent execve(2) argument buffers.</p> + <h1>Impact:</h1> + <p>The bug may be exploitable by an unprivileged user to obtain + superuser privileges.</p> + </body> + </description> + <references> + <cvename>CVE-2026-7270</cvename> + <freebsdsa>SA-26:13.exec</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + + <vuln vid="9eb2533e-4434-11f1-bb07-bc241121aa0a"> + <topic>FreeBSD -- Remote code execution via malicious DHCP options </topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>15.0</ge><lt>15.0_7</lt></range> + <range><ge>14.4</ge><lt>14.4_3</lt></range> + <range><ge>14.3</ge><lt>14.3_12</lt></range> + <range><ge>13.5</ge><lt>13.5_13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>The BOOTP file field is written to the lease file without + escaping embedded double-quotes, allowing injection of arbitrary + dhclient.conf directives. When the lease file is subsequently + re-parsed by dhclient, e.g., after a system restart, an attacker-controlled + field from the lease is passed to dhclient-script(8), which evaluates + it.</p> + <h1>Impact:</h1> + <p>A rogue DHCP server may be able to execute arbirary code as + root on a system running dhclient.</p> + </body> + </description> + <references> + <cvename>CVE-2026-42511</cvename> + <freebsdsa>SA-26:12.dhclient</freebsdsa> + </references> + <dates> + <discovery>2026-04-29</discovery> + <entry>2026-04-30</entry> + </dates> + </vuln> + <vuln vid="98c23e2b-43c7-11f1-a190-b42e991fc52e"> <topic>Mozilla -- Sandbox escape</topic> <affects>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69f2b48d.3c280.22db5f4>
