diff options
author | Mark Felder <feld@FreeBSD.org> | 2019-07-30 20:33:50 +0000 |
---|---|---|
committer | Mark Felder <feld@FreeBSD.org> | 2019-07-30 20:33:50 +0000 |
commit | 1196143b164b8856e591f232ea061014dd619353 (patch) | |
tree | a085a45cc5dbf7dd53f4fb8022587ce72ab7e2c3 /security | |
parent | 03c7518967d32d2c1c09b7b7cb82b0de2568c1d5 (diff) | |
download | ports-1196143b164b8856e591f232ea061014dd619353.tar.gz ports-1196143b164b8856e591f232ea061014dd619353.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index de4bf082c705..4c0bc6a0ffea 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3d02520d-b309-11e9-a87f-a4badb2f4699"> + <topic>FreeBSD -- IPv6 fragment reassembly panic in pf(4)</topic> + <affects> + <package> + <name>FreeBSD-kernel</name> + <range><ge>12.0</ge><lt>12.0_4</lt></range> + <range><ge>11.2</ge><lt>11.2_10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>A bug in the pf(4) IPv6 fragment reassembly logic + incorrectly uses the last extension header offset from the + last received packet instead of from the first packet.</p> + <h1>Impact:</h1> + <p>Malicious IPv6 packets with different IPv6 extensions + could cause a kernel panic or potentially a filtering rule + bypass.</p> + </body> + </description> + <references> + <cvename>CVE-2019-5597</cvename> + <freebsdsa>SA-19:05.pf</freebsdsa> + </references> + <dates> + <discovery>2019-05-14</discovery> + <entry>2019-07-30</entry> + </dates> + </vuln> + <vuln vid="1cd89254-b2db-11e9-8001-001b217b3468"> <topic>Gitlab -- Multiple Vulnerabilities</topic> <affects> |