aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2009-10-06 17:37:49 +0800
committerremko <remko@FreeBSD.org>2009-10-06 17:37:49 +0800
commitd219db8002847ed3aa59210c4ba7a53bcedf54e9 (patch)
tree489407989777516b1b60009cfb8d57cbe1abe790
parent8fb7cc0dfd32589a98ec3c75cb652950e26cc1fb (diff)
downloadfreebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.tar.gz
freebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.tar.zst
freebsd-ports-gnome-d219db8002847ed3aa59210c4ba7a53bcedf54e9.zip
Add FreeBSD-SA-09:14.devfs to the VuXML list.
Hat: secteam Facilitated by: Snow B.V.
-rw-r--r--security/vuxml/vuln.xml39
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 36d9bf4e9ea4..16a6eb08d638 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -35,6 +35,45 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="50383bde-b25b-11de-8c83-02e0185f8d72">
+ <topic>FreeBSD -- Devfs / VFS NULL pointer race condition</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>6.3</gt><lt>6.3_13</lt></range>
+ <range><gt>6.4</gt><lt>6.4_7</lt></range>
+ <range><gt>7.1</gt><lt>7.1_8</lt></range>
+ <range><gt>7.2</gt><lt>7.2_4</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Due to the interaction between devfs and VFS, a race condition
+ exists where the kernel might dereference a NULL pointer.</p>
+ <h1>Impact:</h1>
+ <p>Successful exploitation of the race condition can lead to local
+ kernel privilege escalation, kernel data corruption and/or
+ crash.</p>
+ <p>To exploit this vulnerability, an attacker must be able to run
+ code with user privileges on the target system.</p>
+ <h1>Workaround:</h1>
+ <p>An errata note, FreeBSD-EN-09:05.null has been released
+ simultaneously to this advisory, and contains a kernel patch
+ implementing a workaround for a more broad class of
+ vulnerabilities. However, prior to those changes, no workaround
+ is available.</p>
+ </body>
+ </description>
+ <references>
+ <freebsdsa>SA-09:14.devfs</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2009-10-02</discovery>
+ <entry>2009-10-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="90d2e58f-b25a-11de-8c83-02e0185f8d72">
<topic>FreeBSD -- kqueue pipe race conditions</topic>
<affects>