FreeBSD Bugzilla – Attachment 211160 Details for
Bug 243702
security/vuxml: Add January FreeBSD Security Advisories SA-20:01.libfetch, SA-20:02.ipsec and SA-20:03.thrmisc
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
vuln.xml patch with SAs
2020-01-29_SA-20:03.thrmisc_vuln.xml.patch (text/plain), 3.34 KB, created by
Miroslav Lachman
on 2020-01-29 09:38:20 UTC
(
hide
)
Description:
vuln.xml patch with SAs
Filename:
MIME Type:
Creator:
Miroslav Lachman
Created:
2020-01-29 09:38:20 UTC
Size:
3.34 KB
patch
obsolete
>--- vuln.xml 2020-01-29 10:24:11.927544000 +0100 >+++ vuln.xml.new 2020-01-29 10:26:06.054639000 +0100 >@@ -58,6 +58,96 @@ > * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> >+ <vuln vid="6025d173-4279-11ea-b184-f8b156ac3ff9"> >+ <topic>FreeBSD -- kernel stack data disclosure</topic> >+ <affects> >+ <package> >+ <name>FreeBSD-kernel</name> >+ <range><ge>12.1</ge><lt>12.1_2</lt></range> >+ <range><ge>12.0</ge><lt>12.0_13</lt></range> >+ <range><ge>11.3</ge><lt>11.3_6</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <p>Due to incorrect initialization of a stack data structure, up to 20 >+ bytes of kernel data stored previously stored on the stack will be >+ exposed to a crashing user process.</p> >+ <h1>Impact:</h1> >+ <p>Sensitive kernel data may be disclosed.</p> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2019-15875</cvename> >+ <freebsdsa>SA-20:03.thrmisc</freebsdsa> >+ </references> >+ <dates> >+ <discovery>2020-01-28</discovery> >+ <entry>2020-01-29</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="5797c807-4279-11ea-b184-f8b156ac3ff9"> >+ <topic>FreeBSD -- Missing IPsec anti-replay window check</topic> >+ <affects> >+ <package> >+ <name>FreeBSD-kernel</name> >+ <range><ge>12.0</ge><lt>12.0_13</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <p>A missing check means that an attacker can reinject an old packet and >+ it will be accepted and processed by the IPsec endpoint.</p> >+ <h1>Impact:</h1> >+ <p>The impact depends on the higher-level protocols in use over IPsec. >+ For example, an attacker who can capture and inject packets could >+ cause an action that was intentionally performed once to be repeated.</p> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2019-5613</cvename> >+ <freebsdsa>SA-20:02.ipsec</freebsdsa> >+ </references> >+ <dates> >+ <discovery>2020-01-28</discovery> >+ <entry>2020-01-29</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="22b41bc5-4279-11ea-b184-f8b156ac3ff9"> >+ <topic>FreeBSD -- libfetch buffer overflow</topic> >+ <affects> >+ <package> >+ <name>FreeBSD</name> >+ <range><ge>12.1</ge><lt>12.1_2</lt></range> >+ <range><ge>12.0</ge><lt>12.0_13</lt></range> >+ <range><ge>11.3</ge><lt>11.3_6</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <p>A programming error allows an attacker who can specify a URL with a >+ username and/or password components to overflow libfetch(3) buffers.</p> >+ <h1>Impact:</h1> >+ <p>An attacker in control of the URL to be fetched (possibly via HTTP >+ redirect) may cause a heap buffer overflow, resulting in program >+ misbehavior or malicious code execution.</p> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2020-7450</cvename> >+ <freebsdsa>SA-20:01.libfetch</freebsdsa> >+ </references> >+ <dates> >+ <discovery>2020-01-28</discovery> >+ <entry>2020-01-29</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="5f0dd349-40a2-11ea-8d8c-005056a311d1"> > <topic>samba -- multiple vulnerabilities</topic> > <affects>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 243702
: 211160