Date: Tue, 6 Oct 2015 02:54:50 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r398678 - head/security/vuxml Message-ID: <201510060254.t962soSd043879@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Tue Oct 6 02:54:49 2015 New Revision: 398678 URL: https://svnweb.freebsd.org/changeset/ports/398678 Log: Document OpenSMTPD vulnerabilities (5.7.3) Revise pkg name, add PORTEPOCH, add more detail to earlier entry (5.7.2) Security: 42852f72-6bd3-11e5-9909-002590263bf5 Security: ee7bdf7f-11bb-4eea-b054-c692ab848c20 Security: CVE-2015-7687 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Oct 6 02:24:46 2015 (r398677) +++ head/security/vuxml/vuln.xml Tue Oct 6 02:54:49 2015 (r398678) @@ -58,6 +58,37 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="42852f72-6bd3-11e5-9909-002590263bf5"> + <topic>OpenSMTPD -- multiple vulnerabilities</topic> + <affects> + <package> + <name>opensmtpd</name> + <range><lt>5.7.3,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>OpenSMTPD developers report:</p> + <blockquote cite="https://www.opensmtpd.org/announces/release-5.7.3.txt"> + <p>fix an mda buffer truncation bug which allows a user to create + forward files that pass session checks but fail delivery later down + the chain, within the user mda</p> + <p>fix remote buffer overflow in unprivileged pony process</p> + <p>reworked offline enqueue to better protect against hardlink + attacks</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.openwall.com/lists/oss-security/2015/10/04/2</url> + <url>https://www.opensmtpd.org/announces/release-5.7.3.txt</url> + </references> + <dates> + <discovery>2015-10-04</discovery> + <entry>2015-10-06</entry> + </dates> + </vuln> + <vuln vid="5d280761-6bcf-11e5-9909-002590263bf5"> <topic>mbedTLS/PolarSSL -- multiple vulnerabilities</topic> <affects> @@ -254,16 +285,33 @@ Notes: <topic>OpenSMTPD -- multiple vulnerabilities</topic> <affects> <package> - <name>smtpd</name> - <range><lt>5.7.2</lt></range> + <name>opensmtpd</name> + <range><lt>5.7.2,1</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>OpenSMTPD developers report:</p> <blockquote cite="https://www.opensmtpd.org/announces/release-5.7.2.txt"> - <p>This is a minor release with security and reliability fixes only. - You are encouraged to update as soon as possible.</p> + <p>an oversight in the portable version of fgetln() that allows + attackers to read and write out-of-bounds memory</p> + <p>multiple denial-of-service vulnerabilities that allow local users + to kill or hang OpenSMTPD</p> + <p>a stack-based buffer overflow that allows local users to crash + OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd + user</p> + <p>a hardlink attack (or race-conditioned symlink attack) that allows + local users to unset the chflags() of arbitrary files</p> + <p>a hardlink attack that allows local users to read the first line of + arbitrary files (for example, root's hash from /etc/master.passwd) + </p> + <p>a denial-of-service vulnerability that allows remote attackers to + fill OpenSMTPD's queue or mailbox hard-disk partition</p> + <p>an out-of-bounds memory read that allows remote attackers to crash + OpenSMTPD, or leak information and defeat the ASLR protection</p> + <p>a use-after-free vulnerability that allows remote attackers to + crash OpenSMTPD, or execute arbitrary code as the non-chrooted + _smtpd user</p> </blockquote> </body> </description> @@ -274,6 +322,7 @@ Notes: <dates> <discovery>2015-10-02</discovery> <entry>2015-10-04</entry> + <modified>2015-10-06</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201510060254.t962soSd043879>