Patches for SA-13:09 and SA-13:10 were retroactively released for 9.2-RC1.

Approved by:	so
This commit is contained in:
Dag-Erling Smørgrav 2013-09-10 10:25:27 +00:00
parent 0cceeef13b
commit e8346ce7d0
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=42641
2 changed files with 22 additions and 9 deletions

View file

@ -1,6 +1,7 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-13:09.ip_multicast Security Advisory
The FreeBSD Project
@ -12,6 +13,7 @@ Announced: 2013-08-22
Credits: Clement Lecigne (Google Security Team)
Affects: All supported versions of FreeBSD.
Corrected: 2013-08-22 00:51:37 UTC (stable/9, 9.2-PRERELEASE)
2013-08-22 00:51:43 UTC (releng/9.1, 9.2-RC1-p1)
2013-08-22 00:51:43 UTC (releng/9.2, 9.2-RC2-p1)
2013-08-22 00:51:48 UTC (releng/9.1, 9.1-RELEASE-p6)
2013-08-22 00:51:37 UTC (stable/8, 8.4-STABLE)
@ -23,6 +25,11 @@ For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.
0. Revision History
v1.0 2013-08-22 Initial release.
v1.1 2013-09-07 Binary patch released for 9.2-RC1.
I. Background
IP multicast is a method of sending Internet Protocol (IP) datagrams to a
@ -113,9 +120,9 @@ VII. References
The latest revision of this advisory is available at
<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21 (FreeBSD)
Version: GnuPG v1.4.14 (FreeBSD)
iEYEARECAAYFAlIVY1YACgkQFdaIBMps37K1cwCeOwXryun/C0EceD7v1se+z8w1
EUYAoJ7Hh/bOjyuD6oR6ZOEqtDVIL5LP
=6Ehk
iEYEARECAAYFAlIu8qwACgkQFdaIBMps37KmDACffK3NpvynB4cvgE1nCGU9EVKs
K0oAoJq4UDDDHr2rTCHX12FuW8RBkjMO
=zN3R
-----END PGP SIGNATURE-----

View file

@ -13,6 +13,7 @@ Announced: 2013-08-22
Credits: Julian Seward, Michael Tuexen
Affects: All supported versions of FreeBSD.
Corrected: 2013-08-15 04:25:16 UTC (stable/9, 9.2-PRERELEASE)
2013-08-15 XX:XX:XX UTC (releng/9.2, 9.2-RC1-p1)
2013-08-15 05:14:20 UTC (releng/9.2, 9.2-RC2)
2013-08-22 00:51:48 UTC (releng/9.1, 9.1-RELEASE-p6)
2013-08-15 04:35:25 UTC (stable/8, 8.4-STABLE)
@ -24,6 +25,11 @@ For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.
0. Revision History
v1.0 2013-08-22 Initial release.
v1.1 2013-09-07 Binary patch released for 9.2-RC1.
I. Background
The SCTP protocol provides reliable, flow-controlled, two-way transmission
@ -47,7 +53,7 @@ separate instances in which a 4-byte fragment may be transmitted.
This memory might contain sensitive information, such as portions of the
file cache or terminal buffers. This information might be directly
useful, or it might be leveraged to obtain elevated privileges in
some way. For example, a terminal buffer might include an user-entered
some way. For example, a terminal buffer might include a user-entered
password.
IV. Workaround
@ -125,9 +131,9 @@ VII. References
The latest revision of this advisory is available at
<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21 (FreeBSD)
Version: GnuPG v1.4.14 (FreeBSD)
iEYEARECAAYFAlIVY1YACgkQFdaIBMps37L0AQCgh30FZd+f+rmzMabRFkTPVEmX
tZgAnRuZptKgvlHkqnEhUj30tH6xLDCO
=KJ8k
iEYEARECAAYFAlIu8q8ACgkQFdaIBMps37JpbACeJXSIvG9NbUV3nyAH7qNYOQ77
gcwAn1hrgNyPtqtZpPe8qE1wpSxhn9+r
=g163
-----END PGP SIGNATURE-----