[Midnightbsd-cvs] www [522] trunk/security/index.html: add 0.4-RELEASE-p4 patch notes

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Tue Sep 10 19:42:19 EDT 2013


Revision: 522
          http://svnweb.midnightbsd.org/www/?rev=522
Author:   laffer1
Date:     2013-09-10 19:42:18 -0400 (Tue, 10 Sep 2013)
Log Message:
-----------
add 0.4-RELEASE-p4 patch notes

Modified Paths:
--------------
    trunk/security/index.html

Modified: trunk/security/index.html
===================================================================
--- trunk/security/index.html	2013-08-28 22:59:23 UTC (rev 521)
+++ trunk/security/index.html	2013-09-10 23:42:18 UTC (rev 522)
@@ -16,22 +16,55 @@
 			<div class="clear"></div>
 			<div id="text">
 				<h2><img src="../images/oxygen/security32.png" alt="" /> Security Updates</h2>
+				
+				<blockquote class="bluebox" id="a20130910">
+					<h3>September 10, 2013</h3>
 
+					<p>MidnightBSD 0.4-RELEASE-p4</p>
+				
+					<p>nullfs(5)</p>
+
+        			<p>The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
+        			check whether the source and target of the link are both in the same
+        			nullfs instance.  It is therefore possible to create a hardlink from a
+       				location in one nullfs instance to a file in another, as long as the
+       				underlying (source) filesystem is the same.</p>
+
+        			<p>ifioctl</p>
+
+        			<p>As is commonly the case, the IPv6 and ATM network layer ioctl request
+        			handlers are written in such a way that an unrecognized request is
+        			passed on unmodified to the link layer, which will either handle it or
+        			return an error code.</p>
+
+        			<p>
+        			Network interface drivers, however, assume that the SIOCSIFADDR,
+        			SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
+        			handled at the network layer, and therefore do not perform input
+        			validation or verify the caller's credentials.  Typical link-layer
+        			actions for these requests may include marking the interface as "up"
+        			and resetting the underlying hardware.
+					</p>
+
+					<p>Patches obtained from FreeBSD</p>
+				</blockquote>
+
 				<blockquote class="bluebox" id="a20130822">
 					<h3>August 22, 2013</h3>
 
 					<p>MidnightBSD 0.4-RELEASE-p2</p>
-					<p>Fix an integer overflow in IP_MSFILTER (IP MULTICAST). This could be exploited to read memory by a user process.</p>
+					<p>Fix an integer overflow in IP_MSFILTER (IP MULTICAST). This could be exploited
+					to read memory by a user process.</p>
 
 					<p>When initializing the SCTP state cookie being sent in INIT-ACK chunks,
-a buffer allocated from the kernel stack is not completely initialized.</p>
+					a buffer allocated from the kernel stack is not completely initialized.</p>
 
 					<p>Patches obtained from FreeBSD</p>
 				</blockquote>
 
-				<blockquote class="bluebox" id="a20130728">
-                                        <h3>July 28, 2013</h3>
-                                        <p>MidnightBSD 0.4-RELEASE-p1</p>
+				<blockquote class="bluebox" id="a20130728"
+					<h3>July 28, 2013</h3>
+                    <p>MidnightBSD 0.4-RELEASE-p1</p>
 					<p>Vulnerabilities were reported in BIND and NFS Server.  BIND has a defect
 					resulting in a possible denial of service attack with malformed rdata in a query. This
 					affects only systems running named and not DNS clients.</p>
@@ -40,16 +73,16 @@
 					NFS export, when -network or -host restrictions are used at the same time. This
 					patch was obtained from FreeBSD.
 					</p>
-                                </blockquote>
+				</blockquote>
 
 				<blockquote class="bluebox" id="a20120612">
-                                        <h3>June 6, 2012</h3>
-                                        <p>MidnightBSD 0.3-RELEASE-p9</p>
+					<h3>June 6, 2012</h3>                    
+                    <p>MidnightBSD 0.3-RELEASE-p9</p>
 					<p>A vulnerability exists in bind related to resource records.  A zero length
 					request can cause bind to crash resulting in a denial of service or
 					disclosure of information.</p>
 					<p>CVE-2012-1667</p>
-                                </blockquote>
+				</blockquote>
 
 				<blockquote class="bluebox" id="a20120530a">
 					<h3>May 30, 2012</h3>



More information about the Midnightbsd-cvs mailing list