diff options
author | remko <remko@FreeBSD.org> | 2009-10-06 17:37:49 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2009-10-06 17:37:49 +0800 |
commit | d219db8002847ed3aa59210c4ba7a53bcedf54e9 (patch) | |
tree | 489407989777516b1b60009cfb8d57cbe1abe790 | |
parent | 8fb7cc0dfd32589a98ec3c75cb652950e26cc1fb (diff) | |
download | freebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.tar.gz freebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.tar.zst freebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.zip |
Add FreeBSD-SA-09:14.devfs to the VuXML list.
Hat: secteam
Facilitated by: Snow B.V.
-rw-r--r-- | security/vuxml/vuln.xml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 36d9bf4e9ea4..16a6eb08d638 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,6 +35,45 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="50383bde-b25b-11de-8c83-02e0185f8d72"> + <topic>FreeBSD -- Devfs / VFS NULL pointer race condition</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><gt>6.3</gt><lt>6.3_13</lt></range> + <range><gt>6.4</gt><lt>6.4_7</lt></range> + <range><gt>7.1</gt><lt>7.1_8</lt></range> + <range><gt>7.2</gt><lt>7.2_4</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>Due to the interaction between devfs and VFS, a race condition + exists where the kernel might dereference a NULL pointer.</p> + <h1>Impact:</h1> + <p>Successful exploitation of the race condition can lead to local + kernel privilege escalation, kernel data corruption and/or + crash.</p> + <p>To exploit this vulnerability, an attacker must be able to run + code with user privileges on the target system.</p> + <h1>Workaround:</h1> + <p>An errata note, FreeBSD-EN-09:05.null has been released + simultaneously to this advisory, and contains a kernel patch + implementing a workaround for a more broad class of + vulnerabilities. However, prior to those changes, no workaround + is available.</p> + </body> + </description> + <references> + <freebsdsa>SA-09:14.devfs</freebsdsa> + </references> + <dates> + <discovery>2009-10-02</discovery> + <entry>2009-10-06</entry> + </dates> + </vuln> + <vuln vid="90d2e58f-b25a-11de-8c83-02e0185f8d72"> <topic>FreeBSD -- kqueue pipe race conditions</topic> <affects> |