aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjrm <jrm@FreeBSD.org>2018-06-16 22:43:00 +0800
committerjrm <jrm@FreeBSD.org>2018-06-16 22:43:00 +0800
commit81441a288f701dcde27d15845776d46401af1e27 (patch)
treea3493ce6454fd9bb56c8c475866b6a77a2063337 /security
parent9dbfcec00ff6cefa03da5b49d08b57cbd72443d9 (diff)
downloadfreebsd-ports-gnome-81441a288f701dcde27d15845776d46401af1e27.tar.gz
freebsd-ports-gnome-81441a288f701dcde27d15845776d46401af1e27.tar.zst
freebsd-ports-gnome-81441a288f701dcde27d15845776d46401af1e27.zip
security/vuxml: document Slurm vulnerability
https://lists.schedmd.com/pipermail/slurm-announce/2018/000008.html While here, silence validation warnings caused by node.js 2018-06-15 entry.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml93
1 files changed, 61 insertions, 32 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 79adb2e429b6..925b54d8745a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,35 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3a66cb69-716f-11e8-be54-3085a9a47796">
+ <topic>slurm -- insecure handling of user_name and gid fields</topic>
+ <affects>
+ <package>
+ <name>slurm-wlm</name>
+ <range><lt>17.02.11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SchedMD reports:</p>
+ <blockquote cite="https://lists.schedmd.com/pipermail/slurm-announce/2018/000008.html">
+ <h1>Insecure handling of user_name and gid fields (CVE-2018-10995)</h1>
+ <p>While fixes are only available for the supported 17.02 and 17.11
+ releases, it is believed that similar vulnerabilities do affect past
+ versions as well. The only resolution is to upgrade Slurm to a fixed
+ release.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.schedmd.com/pipermail/slurm-announce/2018/000008.html</url>
+ </references>
+ <dates>
+ <discovery>2018-05-30</discovery>
+ <entry>2018-06-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="45b8e2eb-7056-11e8-8fab-63ca6e0e13a2">
<topic>node.js -- multiple vulnerabilities</topic>
<affects>
@@ -78,43 +107,43 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Node.js reports:</p>
<blockquote cite="https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/">
- <h1>Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)</h1>
+ <h1>Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)</h1>
<p>All versions of 8.x and later are vulnerable and the severity is
- HIGH. An attacker can cause a denial of service (DoS) by causing a
- node server providing an http2 server to crash. This can be
- accomplished by interacting with the http2 server in a manner that
- triggers a cleanup bug where objects are used in native code after
- they are no longer available. This has been addressed by updating
- the http2 implementation. Thanks to Jordan Zebor at F5 Networks for
- reporting this issue.</p>
- <h1>Denial of Service, nghttp2 dependency (CVE-2018-1000168)</h1>
+ HIGH. An attacker can cause a denial of service (DoS) by causing a
+ node server providing an http2 server to crash. This can be
+ accomplished by interacting with the http2 server in a manner that
+ triggers a cleanup bug where objects are used in native code after
+ they are no longer available. This has been addressed by updating
+ the http2 implementation. Thanks to Jordan Zebor at F5 Networks for
+ reporting this issue.</p>
+ <h1>Denial of Service, nghttp2 dependency (CVE-2018-1000168)</h1>
<p>All versions of 9.x and later are vulnerable and the severity is
- HIGH. Under certain conditions, a malicious client can trigger an
- uninitialized read (and a subsequent segfault) by sending a
- malformed ALTSVC frame. This has been addressed through an by
- updating nghttp2.</p>
- <h1>Denial of Service Vulnerability in TLS (CVE-2018-7162)</h1>
+ HIGH. Under certain conditions, a malicious client can trigger an
+ uninitialized read (and a subsequent segfault) by sending a
+ malformed ALTSVC frame. This has been addressed through an by
+ updating nghttp2.</p>
+ <h1>Denial of Service Vulnerability in TLS (CVE-2018-7162)</h1>
<p>All versions of 9.x and later are vulnerable and the severity is
- HIGH. An attacker can cause a denial of service (DoS) by causing a
- node process which provides an http server supporting TLS server to
- crash. This can be accomplished by sending duplicate/unexpected
- messages during the handshake. This vulnerability has been addressed
- by updating the TLS implementation. Thanks to Jordan Zebor at F5
- Networks all of his help investigating this issue with the Node.js
- team.</p>
- <h1>Memory exhaustion DoS on v9.x (CVE-2018-7164)</h1>
+ HIGH. An attacker can cause a denial of service (DoS) by causing a
+ node process which provides an http server supporting TLS server to
+ crash. This can be accomplished by sending duplicate/unexpected
+ messages during the handshake. This vulnerability has been addressed
+ by updating the TLS implementation. Thanks to Jordan Zebor at F5
+ Networks all of his help investigating this issue with the Node.js
+ team.</p>
+ <h1>Memory exhaustion DoS on v9.x (CVE-2018-7164)</h1>
<p>Versions 9.7.0 and later are vulnerable and the severity is MEDIUM.
- A bug introduced in 9.7.0 increases the memory consumed when reading
- from the network into JavaScript using the net.Socket object
- directly as a stream. An attacker could use this cause a denial of
- service by sending tiny chunks of data in short succession. This
- vulnerability was restored by reverting to the prior behaviour.</p>
- <h1>Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)</h1>
+ A bug introduced in 9.7.0 increases the memory consumed when reading
+ from the network into JavaScript using the net.Socket object
+ directly as a stream. An attacker could use this cause a denial of
+ service by sending tiny chunks of data in short succession. This
+ vulnerability was restored by reverting to the prior behaviour.</p>
+ <h1>Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)</h1>
<p>Calling Buffer.fill() or Buffer.alloc() with some parameters can
- lead to a hang which could result in a Denial of Service. In order
- to address this vulnerability, the implementations of Buffer.alloc()
- and Buffer.fill() were updated so that they zero fill instead of
- hanging in these cases.</p>
+ lead to a hang which could result in a Denial of Service. In order
+ to address this vulnerability, the implementations of Buffer.alloc()
+ and Buffer.fill() were updated so that they zero fill instead of
+ hanging in these cases.</p>
</blockquote>
</body>
</description>