git: 90fa03342c4d - main - security/vuxml: belatedly add FreeBSD SAs issued on 2024-08-07
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 20 Sep 2024 06:48:13 UTC
The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=90fa03342c4dc48297d87aeb91d2c17adbcf7c4c commit 90fa03342c4dc48297d87aeb91d2c17adbcf7c4c Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2024-09-20 06:46:14 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2024-09-20 06:48:05 +0000 security/vuxml: belatedly add FreeBSD SAs issued on 2024-08-07 FreeBSD-SA-24:05.pf affects all supported versions of FreeBSD FreeBSD-SA-24:06.ktrace affects all supported versions of FreeBSD FreeBSD-SA-24:07.nfsclient affects all supported versions of FreeBSD --- security/vuxml/vuln/2024.xml | 108 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 108 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 61f481d05e61..c7c4e7c20cb4 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,111 @@ + <vuln vid="c02b8db5-771b-11ef-9a62-002590c1f29c"> + <topic>FreeBSD -- NFS client accepts file names containing path separators</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>14.1</ge><lt>14.1_3</lt></range> + <range><ge>14.0</ge><lt>14.0_9</lt></range> + <range><ge>13.3</ge><lt>13.3_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>When mounting a remote filesystem using NFS, the kernel did not + sanitize remotely provided filenames for the path separator character, + "/". This allows readdir(3) and related functions to return + filesystem entries with names containing additional path components.</p> + <h1>Impact:</h1> + <p>The lack of validation described above gives rise to a confused + deputy problem. For example, a program copying files from an NFS + mount could be tricked into copying from outside the intended source + directory, and/or to a location outside the intended destination + directory.</p> + </body> + </description> + <references> + <cvename>CVE-2024-6759</cvename> + <freebsdsa>SA-24:07.nfsclient</freebsdsa> + </references> + <dates> + <discovery>2024-08-07</discovery> + <entry>2024-09-20</entry> + </dates> + </vuln> + + <vuln vid="8fb61d94-771b-11ef-9a62-002590c1f29c"> + <topic>FreeBSD -- ktrace(2) fails to detach when executing a setuid binary</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>14.1</ge><lt>14.1_3</lt></range> + <range><ge>14.0</ge><lt>14.0_9</lt></range> + <range><ge>13.3</ge><lt>13.3_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A logic bug in the code which disables kernel tracing for setuid + programs meant that tracing was not disabled when it should have, + allowing unprivileged users to trace and inspect the behavior of + setuid programs.</p> + <h1>Impact:</h1> + <p>The bug may be used by an unprivileged user to read the contents + of files to which they would not otherwise have access, such as the + local password database.</p> + </body> + </description> + <references> + <cvename>CVE-2024-6760</cvename> + <freebsdsa>SA-24:06.ktrace</freebsdsa> + </references> + <dates> + <discovery>2024-08-07</discovery> + <entry>2024-09-20</entry> + </dates> + </vuln> + + <vuln vid="f140cff0-771a-11ef-9a62-002590c1f29c"> + <topic>FreeBSD -- pf incorrectly matches different ICMPv6 states in the state table</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>14.1</ge><lt>14.1_3</lt></range> + <range><ge>14.0</ge><lt>14.0_9</lt></range> + <range><ge>13.3</ge><lt>13.3_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When + pf is configured to allow ND and block incoming Echo Requests, a + crafted Echo Request packet after a Neighbor Solicitation (NS) can + trigger an Echo Reply. The packet has to come from the same host + as the NS and have a zero as identifier to match the state created + by the Neighbor Discovery and allow replies to be generated.</p> + <h1>Impact:</h1> + <p>ICMPv6 packets with identifier value of zero bypass firewall + rules written on the assumption that the incoming packets are going + to create a state in the state table.</p> + <h1>Note:</h1> + <p>This advisory introduced additional issues that were addressed by + FreeBSD-EN-24:16.pf. Please refer to that erratum for additional + fixes.</p> + </body> + </description> + <references> + <cvename>CVE-2024-6640</cvename> + <freebsdsa>SA-24:05.pf</freebsdsa> + <url>https://www.freebsd.org/security/advisories/FreeBSD-EN-24:16.pf.asc</url> + </references> + <dates> + <discovery>2024-08-07</discovery> + <entry>2024-09-20</entry> + </dates> + </vuln> + <vuln vid="93c12fe5-7716-11ef-9a62-002590c1f29c"> <topic>FreeBSD -- Integer overflow in libnv</topic> <affects>