diff options
author | remko <remko@FreeBSD.org> | 2008-09-06 00:44:26 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2008-09-06 00:44:26 +0800 |
commit | 15bc2fadb1c6a850fc36f96ec515318b1a9d7984 (patch) | |
tree | de69792c7d08fad0d68aa8265b7dc65ebc4a7dfc /security | |
parent | d933655418b4f9ef7025bfebfa8a4f657aed5e24 (diff) | |
download | freebsd-ports-gnome-15bc2fadb1c6a850fc36f96ec515318b1a9d7984.tar.gz freebsd-ports-gnome-15bc2fadb1c6a850fc36f96ec515318b1a9d7984.tar.zst freebsd-ports-gnome-15bc2fadb1c6a850fc36f96ec515318b1a9d7984.zip |
Add FreeBSD-SA-08:09.icmp6
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d6f55330d2c5..b4f267024f59 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2f794295-7b69-11dd-80ba-000bcdf0a03b"> + <topic>FreeBSD -- Remote kernel panics on IPv6 connections</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><gt>6.3</gt><lt>6.3_4</lt></range> + <range><gt>7.0</gt><lt>7.0_4</lt></range> + </system> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>In case of an incoming ICMPv6 'Packet Too Big Message', there + is an insufficient check on the proposed new MTU for a path to + the destination.</p> + <h1>Impact:</h1> + <p>When the kernel is configured to process IPv6 packets and has + active IPv6 TCP sockets, a specifically crafted ICMPv6 'Packet + Too Big Message' could cause the TCP stack of the kernel to + panic.</p> + <h1>Workaround:</h1> + <p>Systems without INET6 / IPv6 support are not vulnerable and + neither are systems which do not listen on any IPv6 TCP sockets + and have no active IPv6 connections.</p> + <p>Filter ICMPv6 'Packet Too Big Messages' using a firewall, but + this will at the same time break PMTU support for IPv6 + connections.</p> + </body> + </description> + <references> + <cvename>CVE-2008-3530</cvename> + <freebsdsa>SA-08:09.icmp6</freebsdsa> + </references> + <dates> + <discovery>2008-09-03</discovery> + <entry>2008-09-05</entry> + </dates> + </vuln> + <vuln vid="7dbb7197-7b68-11dd-80ba-000bcdf0a03b"> <topic>FreeBSD -- nmount(2) local arbitrary code execution</topic> <affects> |