git: 327b7fac9bf6 - main - security/vuxml: add FreeBSD SAs issued on 2025-01-29
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 30 Jan 2025 04:02:43 UTC
The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=327b7fac9bf6e3d47c38afc1e4dca6dad69e1fcc commit 327b7fac9bf6e3d47c38afc1e4dca6dad69e1fcc Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2025-01-30 04:02:20 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2025-01-30 04:02:20 +0000 security/vuxml: add FreeBSD SAs issued on 2025-01-29 FreeBSD-SA-25:01.openssh affects FreeBSD 14.1 FreeBSD-SA-25:02.fs affects all supported versions of FreeBSD FreeBSD-SA-25:03.etcupdate affects all supported versions of FreeBSD FreeBSD-SA-25:04.ktrace affects FreeBSD 14.2 --- security/vuxml/vuln/2025.xml | 138 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 138 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 6d65b0a8170f..1206086935c9 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,141 @@ + <vuln vid="2830b374-debd-11ef-87ba-002590c1f29c"> + <topic>FreeBSD -- Uninitialized kernel memory disclosure via ktrace(2)</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>14.2</ge><lt>14.2_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>In some cases, the ktrace facility will log the contents of + kernel structures to userspace. In one such case, ktrace dumps a + variable-sized sockaddr to userspace. There, the full sockaddr is + copied, even when it is shorter than the full size. This can result + in up to 14 uninitialized bytes of kernel memory being copied out + to userspace.</p> + <h1>Impact:</h1> + <p>It is possible for an unprivileged userspace program to leak + 14 bytes of a kernel heap allocation to userspace.</p> + </body> + </description> + <references> + <cvename>CVE-2025-0662</cvename> + <freebsdsa>SA-25:04.ktrace</freebsdsa> + </references> + <dates> + <discovery>2025-01-29</discovery> + <entry>2025-01-30</entry> + </dates> + </vuln> + + <vuln vid="fa9ae646-debc-11ef-87ba-002590c1f29c"> + <topic>FreeBSD -- Unprivileged access to system files</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>14.2</ge><lt>14.2_1</lt></range> + <range><ge>14.1</ge><lt>14.1_7</lt></range> + <range><ge>13.4</ge><lt>13.4_3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>When etcupdate encounters conflicts while merging files, it + saves a version containing conflict markers in /var/db/etcupdate/conflicts. + This version does not preserve the mode of the input file, and is + world-readable. This applies to files that would normally have + restricted visibility, such as /etc/master.passwd.</p> + <h1>Impact:</h1> + <p>An unprivileged local user may be able to read encrypted root + and user passwords from the temporary master.passwd file created + in /var/db/etcupdate/conflicts. This is possible only when conflicts + within the password file arise during an update, and the unprotected + file is deleted when conflicts are resolved.</p> + </body> + </description> + <references> + <cvename>CVE-2025-0374</cvename> + <freebsdsa>SA-25:03.etcupdate</freebsdsa> + </references> + <dates> + <discovery>2025-01-29</discovery> + <entry>2025-01-30</entry> + </dates> + </vuln> + + <vuln vid="ab0cbe3f-debc-11ef-87ba-002590c1f29c"> + <topic>FreeBSD -- Buffer overflow in some filesystems via NFS</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>14.2</ge><lt>14.2_1</lt></range> + <range><ge>14.1</ge><lt>14.1_7</lt></range> + <range><ge>13.4</ge><lt>13.4_3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>In order to export a file system via NFS, the file system must + define a file system identifier (FID) for all exported files. Each + FreeBSD file system implements operations to translate between FIDs + and vnodes, the kernel's in-memory representation of files. These + operations are VOP_VPTOFH(9) and VFS_FHTOVP(9).</p> + <p>On 64-bit systems, the implementation of VOP_VPTOFH() in the + cd9660, tarfs and ext2fs filesystems overflows the destination FID + buffer by 4 bytes, a stack buffer overflow.</p> + <h1>Impact:</h1> + <p>A NFS server that exports a cd9660, tarfs, or ext2fs file system + can be made to panic by mounting and accessing the export with an + NFS client. Further exploitation (e.g., bypassing file permission + checking or remote kernel code execution) is potentially possible, + though this has not been demonstrated. In particular, release + kernels are compiled with stack protection enabled, and some instances + of the overflow are caught by this mechanism, causing a panic.</p> + </body> + </description> + <references> + <cvename>CVE-2025-0373</cvename> + <freebsdsa>SA-25:02.fs</freebsdsa> + </references> + <dates> + <discovery>2025-01-29</discovery> + <entry>2025-01-30</entry> + </dates> + </vuln> + + <vuln vid="69e19c0b-debc-11ef-87ba-002590c1f29c"> + <topic>FreeBSD -- OpenSSH Keystroke Obfuscation Bypass</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>14.1</ge><lt>14.1_7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A logic error in the ssh(1) ObscureKeystrokeTiming feature (on + by default) rendered this feature ineffective.</p> + <h1>Impact:</h1> + <p>A passive observer could detect which network packets contain + real keystrokes, and infer the specific characters being transmitted + from packet timing.</p> + </body> + </description> + <references> + <cvename>CVE-2024-39894</cvename> + <freebsdsa>SA-25:01.openssh</freebsdsa> + </references> + <dates> + <discovery>2025-01-29</discovery> + <entry>2025-01-30</entry> + </dates> + </vuln> + <vuln vid="258a58a9-6583-4808-986b-e785c27b0a18"> <topic>oauth2-proxy -- Non-linear parsing of case-insensitive content</topic> <affects>