aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2007-02-27 19:46:18 +0000
committerRemko Lodder <remko@FreeBSD.org>2007-02-27 19:46:18 +0000
commitd820a7b9a4f8307bbcf8c930f33db563d0ca59c4 (patch)
tree1638c4473dfe1cf3283b06047bd2456aecfe4fa9 /security/vuxml/vuln.xml
parentec9c55f34b00ca163e92c0303eb81f2c0acb5bc3 (diff)
downloadports-d820a7b9a4f8307bbcf8c930f33db563d0ca59c4.tar.gz
ports-d820a7b9a4f8307bbcf8c930f33db563d0ca59c4.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml47
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8311511272d4..1940bd901f59 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,53 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="5c554c0f-c69a-11db-9f82-000e0c2e438a">
+ <topic>FreeBSD -- Kernel memory disclosure in firewire(4)</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>6.1</gt><lt>6.1_11</lt></range>
+ <range><gt>6.0</gt><lt>6.2_16</lt></range>
+ <range><gt>5.5</gt><lt>5.5_9</lt></range>
+ <range><gt>4.11</gt><lt>4.11_26</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>In the FW_GCROM ioctl, a signed integer comparison is used
+ instead of an unsigned integer comparison when computing the
+ length of a buffer to be copied from the kernel into the
+ calling application.</p>
+ <h1>Impact:</h1>
+ <p>A user in the "operator" group can read the contents of
+ kernel memory. Such memory might contain sensitive
+ information, such as portions of the file cache or terminal
+ buffers. This information might be directly useful, or it
+ might be leveraged to obtain elevated privileges in some way;
+ for example, a terminal buffer might include a user-entered
+ password.</p>
+ <h1>Workaround:</h1>
+ <p>No workaround is available, but systems without IEEE 1394
+ ("FireWire") interfaces are not vulnerable. (Note that
+ systems with IEEE 1394 interfaces are affected regardless of
+ whether any devices are attached.)</p>
+ <p>Note also that FreeBSD does not have any non-root users in
+ the "operator" group by default; systems on which no users
+ have been added to this group are therefore also not
+ vulnerable.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-6013</cvename>
+ <freebsdsa>SA-06:25.kmem</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2006-12-06</discovery>
+ <entry>2007-02-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="792bc222-c5d7-11db-9f82-000e0c2e438a">
<topic>libarchive -- Infinite loop in corrupt archives handling in libarchive</topic>
<affects>