From nobody Wed Nov 13 04:21:30 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xp98W1WLmz5d7vy; Wed, 13 Nov 2024 04:21:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xp98W103zz427y; Wed, 13 Nov 2024 04:21:31 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731471691; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=AlL6u8+XQcgemtn9XKbnLnlwzUgIFoq2R4hN7rAm8ZQ=; b=syrOF9/KCeXwrwVh6IueXEAmT1GjUZvlwQ+VIZaH3/ieMdOlKsNva3j7ZKlVpQdHUTNJ+X fEL75P+TTcs6wM6sq/GVpNvRuBOiXPyRfIoUv8FWvxwlnP4mmdhRuyd/7efAzJyq31N+R1 eLJf9RdOkEixlASEzotxvOaV0PMJk1LK0GTUvenPyQo7cJcBiMB1ir5t9E5tyfKQaf7Hfu yYBea8KNP5GTfRWMpNdtaLJdwW0G0hU8H8giH2gLMP5B2Cfh4QdZJt4qFqTK2RHsqoqlc3 kveetIarcQQHCjq7GNhPXG4rGzwBsK5Ltm56chL1OSiNOTcQeHP6WY7W5YXp8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731471691; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=AlL6u8+XQcgemtn9XKbnLnlwzUgIFoq2R4hN7rAm8ZQ=; b=R1Jfw5F6nrHoa7bEVvAG0pIaqcKN17MUHWpEKMweIBpdyYX9q++kW3y7NshDo07nfjCm0O ku+JdwO2/LSPzgFLphG+pnh797IN/iJJbPhADKIY1AQ2lI6D92cNYnch2PY+RzwXfqFNbh XH+ax9eP7vObqoU5HE2bQ0XG4jXDpe03fs+zmSryx3VKEcGBHTq9UDkiqZw8sSWvFwNKT2 C91SBCWdiArBC+a0gr3pQrjIT63e2fq1B3IFH2a0ag6Tb828DNdgWIYQ7w+0mS1j95FTV8 x9ALQM0VsGNhCUCfP3C0yVJdcA36CB04BxxmNNhpQPCBMcyr2kor4qM77FeWUA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1731471691; a=rsa-sha256; cv=none; b=NbTHJk4QhtbwDPdgvktBgHqaoQ74PN9oDFG1qYttu+ob/NPWIu6NyB8T+apMks+MPxw+iA aKPLAS/crxwS6sWFLwYddMo1EXrY9nagAQXHmAUuO6l7RzUkG5kJ0A6GVFRTjG+Z54Ibib /bRcJk+kx++OkcV7ivXSu0tFIHcv3g7yT6ke9RE1DVbguOk+fktge3mNP6QwNTxq4KmkHh +iqrwYjRaG++AxRMbVjntNsCZfq0an30uu8HSP7H5rrTqEtOxfLOd9JC/350DuuFE9B+l0 XcQfc0nrdjZV0RW65CLiv9G2aCSjNWHJl7zYhClCASaAqLcQnehidFFzxE2yYA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Xp98W0bT5zgDT; Wed, 13 Nov 2024 04:21:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 4AD4LUOj054406; Wed, 13 Nov 2024 04:21:30 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 4AD4LUrj054403; Wed, 13 Nov 2024 04:21:30 GMT (envelope-from git) Date: Wed, 13 Nov 2024 04:21:30 GMT Message-Id: <202411130421.4AD4LUrj054403@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Philip Paeps Subject: git: 0e79ec27f04a - main - security/vuxml: add FreeBSD SAs issued on 2024-10-29 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: philip X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 0e79ec27f04afe521d06b51257d5b548d98ccfa2 Auto-Submitted: auto-generated The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=0e79ec27f04afe521d06b51257d5b548d98ccfa2 commit 0e79ec27f04afe521d06b51257d5b548d98ccfa2 Author: Philip Paeps AuthorDate: 2024-11-13 04:21:13 +0000 Commit: Philip Paeps CommitDate: 2024-11-13 04:21:13 +0000 security/vuxml: add FreeBSD SAs issued on 2024-10-29 FreeBSD-SA-24:17.bhyve affects all supported versions of FreeBSD FreeBSD-SA-24:18.ctl affects all supported versions of FreeBSD FreeBSD-SA-24:19.fetch affects all supported versions of FreeBSD --- security/vuxml/vuln/2024.xml | 108 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 108 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index a7d36c690346..657ab1b9436e 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,111 @@ + + FreeBSD -- Certificate revocation list fetch(1) option fails + + + FreeBSD + 14.114.1_6 + 13.413.4_2 + 13.313.3_8 + + + + +

Problem Description:

+

The fetch(3) library uses environment variables for passing + certain information, including the revocation file pathname. The + environment variable name used by fetch(1) to pass the filename to + the library was incorrect, in effect ignoring the option.

+

Impact:

+

Fetch would still connect to a host presenting a certificate + included in the revocation file passed to the --crl option.

+ +
+ + CVE-2024-45289 + SA-24:19.fetch + + + 2024-10-29 + 2024-11-13 + +
+ + + FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer + + + FreeBSD-kernel + 14.114.1_6 + 13.413.4_2 + 13.313.3_8 + + + + +

Problem Description:

+

The command ctl_persistent_reserve_out allows the caller to + specify an arbitrary size which will be passed to the kernel's + memory allocator.

+

Impact:

+

A malicious guest could cause a Denial of Service (DoS) on the + host.

+ +
+ + CVE-2024-39281 + SA-24:18.ctl + + + 2024-10-29 + 2024-11-13 + +
+ + + FreeBSD -- Multiple issues in the bhyve hypervisor + + + FreeBSD + 14.114.1_6 + 13.413.4_2 + 13.313.3_8 + + + + +

Problem Description:

+

Several vulnerabilities were found in the bhyve hypervisor's + device models.

+

The NVMe driver function nvme_opc_get_log_page is vulnerable to a + buffer over- read from a guest-controlled value. (CVE-2024-51562)

+

The virtio_vq_recordon function is subject to a time-of-check to + time-of-use (TOCTOU) race condition. (CVE-2024-51563)

+

A guest can trigger an infinite loop in the hda audio driver. + (CVE-2024-51564)

+

The hda driver is vulnerable to a buffer over-read from a + guest-controlled value. (CVE-2024-51565)

+

The NVMe driver queue processing is vulernable to guest-induced + infinite loops. (CVE-2024-51566)

+

Impact:

+

Malicious guest virtual machines may be able to perform a denial + of service (DoS) of the bhyve host, and may read memory within the + bhyve process that they should not be able to access.

+ +
+ + CVE-2024-51562 + CVE-2024-51563 + CVE-2024-51564 + CVE-2024-51565 + CVE-2024-51566 + SA-24:17.bhyve + + + 2024-10-29 + 2024-11-13 + +
+ element-web -- several vulnerabilities