svn commit: r327595 - head/security/vuxml
Remko Lodder
remko at FreeBSD.org
Thu Sep 19 05:44:02 UTC 2013
Author: remko (src,doc committer)
Date: Thu Sep 19 05:44:02 2013
New Revision: 327595
URL: http://svnweb.freebsd.org/changeset/ports/327595
Log:
Add the latest two FreeBSD Security Advisories that have impact
on -RELEASE versions. (RC's are not documented).
Hat: secteam
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Sep 19 05:17:52 2013 (r327594)
+++ head/security/vuxml/vuln.xml Thu Sep 19 05:44:02 2013 (r327595)
@@ -51,6 +51,94 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b72bad1c-20ed-11e3-be06-000c29ee3065">
+ <topic>FreeBSD -- Cross-mount links between nullfs(5) mounts</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>9.1</gt><lt>9.1_7</lt></range>
+ <range><gt>8.4</gt><lt>8.4_4</lt></range>
+ <range><gt>8.3</gt><lt>8.3_11</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem Description:</p>
+ <p>The nullfs(5) implementation of the VOP_LINK(9) VFS
+ operation does not check whether the source and target of
+ the link are both in the same nullfs instance. It is
+ therefore possible to create a hardlink from a location in
+ one nullfs instance to a file in another, as long as the
+ underlying (source) filesystem is the same.</p>
+ <p>Impact:</p>
+ <p>If multiple nullfs views into the same filesystem are
+ mounted in different locations, a user with read access to
+ one of these views and write access to another will be able
+ to create a hard link from the latter to a file in the
+ former, even though they are, from the user's perspective,
+ different filesystems. The user may thereby gain write
+ access to files which are nominally on a read-only
+ filesystem.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-5710</cvename>
+ <freebsdsa>SA-13:13.nullfs</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2013-09-10</discovery>
+ <entry>2013-09-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4d87d357-202c-11e3-be06-000c29ee3065">
+ <topic>FreeBSD -- Insufficient credential checks in network ioctl(2)</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>9.1</gt><lt>9.1_7</lt></range>
+ <range><gt>8.4</gt><lt>8.4_4</lt></range>
+ <range><gt>8.3</gt><lt>8.3_11</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem Description:</p>
+ <p>As is commonly the case, the IPv6 and ATM network layer
+ ioctl request handlers are written in such a way that an
+ unrecognized request is passed on unmodified to the link
+ layer, which will either handle it or return an error
+ code.</p>
+ <p>Network interface drivers, however, assume that the
+ SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and
+ SIOCSIFNETMASK requests have been handled at the network
+ layer, and therefore do not perform input validation or
+ verify the caller's credentials. Typical link-layer actions
+ for these requests may include marking the interface as "up"
+ and resetting the underlying hardware.</p>
+ <p>Impact:</p>
+ <p>An unprivileged user with the ability to run arbitrary code
+ can cause any network interface in the system to perform the
+ link layer actions associated with a SIOCSIFADDR,
+ SIOCSIFBRDADDR, SIOCSIFDSTADDR or SIOCSIFNETMASK ioctl
+ request; or trigger a kernel panic by passing a specially
+ crafted address structure which causes a network interface
+ driver to dereference an invalid pointer.</p>
+ <p>Although this has not been confirmed, the possibility that
+ an attacker may be able to execute arbitrary code in kernel
+ context can not be ruled out.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-5691</cvename>
+ <freebsdsa>SA-13:12.ifioctl</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2013-09-10</discovery>
+ <entry>2013-09-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7dfed67b-20aa-11e3-b8d8-0025905a4771">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@@ -215,10 +303,12 @@ Note: Please add new entries to the beg
</description>
<references>
<cvename>CVE-2013-4315</cvename>
+ <url>https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/</url>
</references>
<dates>
<discovery>2013-09-10</discovery>
<entry>2013-09-12</entry>
+ <modified>2013-09-18</modified>
</dates>
</vuln>
More information about the svn-ports-head
mailing list