Add SA-15:18 and SA-15:19.
This commit is contained in:
parent
f671006f0c
commit
217e99633c
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=47162
7 changed files with 424 additions and 0 deletions
136
share/security/advisories/FreeBSD-SA-15:18.bsdpatch.asc
Normal file
136
share/security/advisories/FreeBSD-SA-15:18.bsdpatch.asc
Normal file
|
@ -0,0 +1,136 @@
|
||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
Hash: SHA512
|
||||||
|
|
||||||
|
=============================================================================
|
||||||
|
FreeBSD-SA-15:18.bsdpatch Security Advisory
|
||||||
|
The FreeBSD Project
|
||||||
|
|
||||||
|
Topic: shell injection vulnerability in patch(1)
|
||||||
|
|
||||||
|
Category: contrib
|
||||||
|
Module: patch
|
||||||
|
Announced: 2015-08-05
|
||||||
|
Credits: Martin Natano
|
||||||
|
Affects: FreeBSD 10.x.
|
||||||
|
Corrected: 2015-08-05 22:05:02 UTC (stable/10, 10.2-PRERELEASE)
|
||||||
|
2015-08-05 22:05:02 UTC (stable/10, 10.2-BETA2-p3)
|
||||||
|
2015-08-05 22:05:12 UTC (releng/10.2, 10.2-RC1-p2)
|
||||||
|
2015-08-05 22:05:12 UTC (releng/10.2, 10.2-RC2-p1)
|
||||||
|
2015-08-05 22:05:18 UTC (releng/10.1, 10.1-RELEASE-p17)
|
||||||
|
CVE Name: CVE-2015-1418
|
||||||
|
|
||||||
|
For general information regarding FreeBSD Security Advisories,
|
||||||
|
including descriptions of the fields above, security branches, and the
|
||||||
|
following sections, please visit <URL:https://security.FreeBSD.org/>.
|
||||||
|
|
||||||
|
I. Background
|
||||||
|
|
||||||
|
The patch(1) utility takes a patch file produced by the diff(1) program and
|
||||||
|
apply the differences to an original file, producing a patched version.
|
||||||
|
|
||||||
|
The patch(1) utility supports patches that uses ed(1) script format, as
|
||||||
|
required by the POSIX.1-2008 standard.
|
||||||
|
|
||||||
|
ed(1) is a line-oriented text editor.
|
||||||
|
|
||||||
|
II. Problem Description
|
||||||
|
|
||||||
|
Due to insufficient sanitization of the input patch stream, it is possible
|
||||||
|
for a patch file to cause patch(1) to pass certain ed(1) scripts to the
|
||||||
|
ed(1) editor, which would run commands.
|
||||||
|
|
||||||
|
III. Impact
|
||||||
|
|
||||||
|
This issue could be exploited to execute arbitrary commands as the user
|
||||||
|
invoking patch(1) against a specically crafted patch file, which could be
|
||||||
|
leveraged to obtain elevated privileges.
|
||||||
|
|
||||||
|
IV. Workaround
|
||||||
|
|
||||||
|
No workaround is available, but systems where a privileged user does not
|
||||||
|
make use of patches without proper validation are not affected.
|
||||||
|
|
||||||
|
V. Solution
|
||||||
|
|
||||||
|
Perform one of the following:
|
||||||
|
|
||||||
|
1) Upgrade your vulnerable system to a supported FreeBSD stable or
|
||||||
|
release / security branch (releng) dated after the correction date.
|
||||||
|
|
||||||
|
A reboot is not required after updating.
|
||||||
|
|
||||||
|
2) To update your vulnerable system via a binary patch:
|
||||||
|
|
||||||
|
Systems running a RELEASE version of FreeBSD on the i386 or amd64
|
||||||
|
platforms can be updated via the freebsd-update(8) utility:
|
||||||
|
|
||||||
|
# freebsd-update fetch
|
||||||
|
# freebsd-update install
|
||||||
|
|
||||||
|
A reboot is not required after updating.
|
||||||
|
|
||||||
|
3) To update your vulnerable system via a source code patch:
|
||||||
|
|
||||||
|
The following patches have been verified to apply to the applicable
|
||||||
|
FreeBSD release branches.
|
||||||
|
|
||||||
|
a) Download the relevant patch from the location below, and verify the
|
||||||
|
detached PGP signature using your PGP utility.
|
||||||
|
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-15:18/bsdpatch.patch
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-15:18/bsdpatch.patch.asc
|
||||||
|
# gpg --verify bsdpatch.patch.asc
|
||||||
|
|
||||||
|
b) Apply the patch. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src
|
||||||
|
# patch < /path/to/patch
|
||||||
|
|
||||||
|
c) Recompile the operating system using buildworld and installworld as
|
||||||
|
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
|
||||||
|
|
||||||
|
VI. Correction details
|
||||||
|
|
||||||
|
The following list contains the correction revision numbers for each
|
||||||
|
affected branch.
|
||||||
|
|
||||||
|
Branch/path Revision
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
stable/10/ r286348
|
||||||
|
releng/10.1/ r286351
|
||||||
|
releng/10.2/ r286350
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
|
||||||
|
To see which files were modified by a particular revision, run the
|
||||||
|
following command, replacing NNNNNN with the revision number, on a
|
||||||
|
machine with Subversion installed:
|
||||||
|
|
||||||
|
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
|
||||||
|
|
||||||
|
Or visit the following URL, replacing NNNNNN with the revision number:
|
||||||
|
|
||||||
|
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
|
||||||
|
|
||||||
|
VII. References
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1418>
|
||||||
|
|
||||||
|
The latest revision of this advisory is available at
|
||||||
|
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:18.bsdpatch.asc>
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.6 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAEBCgAGBQJVwoplAAoJEO1n7NZdz2rn8D4QAM0077U1nLiJFIU1VcM9IOKp
|
||||||
|
GeZ/w9SnkrKqKzAQpq3QS1hmw0TxvP8kuJNuRVFF6M15Woprfxccb8mDxM0ntru4
|
||||||
|
t8rq/QLO2jMWopf67Spv6jr6GLLQXkiyRwLEyr7L8a7MbrFwjO1wYt+8GnQ6Nsvn
|
||||||
|
kNfCnbNKPr1gNYM1XsLS7Ej1kl7aBx3xGQXU4d9HlOs/1X7rnPCnGKuc3ZD2Z/N4
|
||||||
|
zu8pV4NMFhWyJsax+FVYEFxwyd2uEb73A35nz/sQhGiwGOCtL424KG+hwj9mnm45
|
||||||
|
8f4m+53b6RDcBh6xU41fghMsac2PVCzY2r9GXXXJNlfEa+KnSN8yC+CvtXYEM9BX
|
||||||
|
9Y5g6i++RVLLT7mwFdG86FjZxSGpDBXlkpZ4I9qiS4YC8MFO4qC7SFzufxtfOcg+
|
||||||
|
R+QSj+DWOfeHDcXjEkHGlqTW9poE2EDWXDLwlEoOykh9NLyWl6enYd8ZEI3GUqyJ
|
||||||
|
FgKiICrs1vUuGhOhTCgjyQjQUc6jaV/GzhLBJfyxz5xYDpr7DIILxJ8uki2FJcHS
|
||||||
|
tZhlNu6JNqpBlsWNspqjw7NSP2j58Uj0bBdwWvFNX8otQiIXVfkdY8RCjxstq5lT
|
||||||
|
3bcF6akAFEBx/f/VYM1lswLM/XdbORYC3asLu84BP541EDqdx9d88TeTKNPvyb4Q
|
||||||
|
sGJ763WSlsoLrQDr8CUt
|
||||||
|
=iR0L
|
||||||
|
-----END PGP SIGNATURE-----
|
164
share/security/advisories/FreeBSD-SA-15:19.routed.asc
Normal file
164
share/security/advisories/FreeBSD-SA-15:19.routed.asc
Normal file
|
@ -0,0 +1,164 @@
|
||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
Hash: SHA512
|
||||||
|
|
||||||
|
=============================================================================
|
||||||
|
FreeBSD-SA-15:19.routed Security Advisory
|
||||||
|
The FreeBSD Project
|
||||||
|
|
||||||
|
Topic: routed(8) remote denial of service vulnerability
|
||||||
|
|
||||||
|
Category: core
|
||||||
|
Module: routed
|
||||||
|
Announced: 2015-08-05
|
||||||
|
Credits: Hiroki Sato
|
||||||
|
Affects: All supported versions of FreeBSD.
|
||||||
|
Corrected: 2015-08-05 22:05:02 UTC (stable/10, 10.2-PRERELEASE)
|
||||||
|
2015-08-05 22:05:02 UTC (stable/10, 10.2-BETA2-p3)
|
||||||
|
2015-08-05 22:05:12 UTC (releng/10.2, 10.2-RC1-p2)
|
||||||
|
2015-08-05 22:05:12 UTC (releng/10.2, 10.2-RC2-p1)
|
||||||
|
2015-08-05 22:05:18 UTC (releng/10.1, 10.1-RELEASE-p17)
|
||||||
|
2015-08-05 22:05:07 UTC (stable/9, 9.3-STABLE)
|
||||||
|
2015-08-05 22:05:24 UTC (releng/9.3, 9.3-RELEASE-p22)
|
||||||
|
CVE Name: CVE-2015-5674
|
||||||
|
|
||||||
|
For general information regarding FreeBSD Security Advisories,
|
||||||
|
including descriptions of the fields above, security branches, and the
|
||||||
|
following sections, please visit <URL:https://security.FreeBSD.org/>.
|
||||||
|
|
||||||
|
I. Background
|
||||||
|
|
||||||
|
The routing information protocol (RIP) is an older routing protocol
|
||||||
|
which, while not as capable as more recent protocols such as OSPF and
|
||||||
|
BGP, is sometimes preferred for its simplicity and therefore still
|
||||||
|
used as an interior gateway protocol on smaller networks.
|
||||||
|
|
||||||
|
Routers in a RIP network periodically broadcast their routing table on
|
||||||
|
all enabled interfaces. Neighboring routers and hosts receive these
|
||||||
|
broadcasts and update their routing tables accordingly.
|
||||||
|
|
||||||
|
The routed(8) daemon is a RIP implementation for FreeBSD. The
|
||||||
|
rtquery(8) utility can be used to send a RIP query to a router and
|
||||||
|
display the result without updating the routing table.
|
||||||
|
|
||||||
|
II. Problem Description
|
||||||
|
|
||||||
|
The input path in routed(8) will accept queries from any source and
|
||||||
|
attempt to answer them. However, the output path assumes that the
|
||||||
|
destination address for the response is on a directly connected
|
||||||
|
network.
|
||||||
|
|
||||||
|
III. Impact
|
||||||
|
|
||||||
|
Upon receipt of a query from a source which is not on a directly
|
||||||
|
connected network, routed(8) will trigger an assertion and terminate.
|
||||||
|
The affected system's routing table will no longer be updated. If the
|
||||||
|
affected system is a router, its routes will eventually expire from
|
||||||
|
other routers' routing tables, and its networks will no longer be
|
||||||
|
reachable unless they are also connected to another router.
|
||||||
|
|
||||||
|
IV. Workaround
|
||||||
|
|
||||||
|
Note that this problem does not affect a system on which routed(8)
|
||||||
|
is not enabled. The routed(8) daemon is not enabled by default.
|
||||||
|
|
||||||
|
Use a packet filter such as pf(4) or ipfw(4) to block incoming UDP
|
||||||
|
packets with destination port 520 that did not originate on the same
|
||||||
|
subnet as the destination address.
|
||||||
|
|
||||||
|
V. Solution
|
||||||
|
|
||||||
|
Perform one of the following:
|
||||||
|
|
||||||
|
1) Upgrade your vulnerable system to a supported FreeBSD stable or
|
||||||
|
release / security branch (releng) dated after the correction date.
|
||||||
|
|
||||||
|
The routed service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
2) To update your vulnerable system via a binary patch:
|
||||||
|
|
||||||
|
Systems running a RELEASE version of FreeBSD on the i386 or amd64
|
||||||
|
platforms can be updated via the freebsd-update(8) utility:
|
||||||
|
|
||||||
|
# freebsd-update fetch
|
||||||
|
# freebsd-update install
|
||||||
|
|
||||||
|
The routed service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
3) To update your vulnerable system via a source code patch:
|
||||||
|
|
||||||
|
The following patches have been verified to apply to the applicable
|
||||||
|
FreeBSD release branches.
|
||||||
|
|
||||||
|
a) Download the relevant patch from the location below, and verify the
|
||||||
|
detached PGP signature using your PGP utility.
|
||||||
|
|
||||||
|
# fetch http://security.FreeBSD.org/patches/SA-15:19/routed.patch
|
||||||
|
# fetch http://security.FreeBSD.org/patches/SA-15:19/routed.patch.asc
|
||||||
|
# gpg --verify routed.patch.asc
|
||||||
|
|
||||||
|
b) Apply the patch. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src
|
||||||
|
# patch < /path/to/routed.patch
|
||||||
|
|
||||||
|
c) Recompile routed. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src/sbin/routed
|
||||||
|
# make && make install
|
||||||
|
|
||||||
|
Restart the routed daemon, or reboot the system.
|
||||||
|
|
||||||
|
To restart the affected service after updating the system, either
|
||||||
|
reboot the system or execute the following command as root:
|
||||||
|
|
||||||
|
# service routed restart
|
||||||
|
|
||||||
|
VI. Correction details
|
||||||
|
|
||||||
|
The following list contains the correction revision numbers for each
|
||||||
|
affected branch.
|
||||||
|
|
||||||
|
Branch/path Revision
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
stable/9/ r286349
|
||||||
|
releng/9.3/ r286352
|
||||||
|
stable/10/ r286348
|
||||||
|
releng/10.1/ r286351
|
||||||
|
releng/10.2/ r286350
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
|
||||||
|
To see which files were modified by a particular revision, run the
|
||||||
|
following command, replacing NNNNNN with the revision number, on a
|
||||||
|
machine with Subversion installed:
|
||||||
|
|
||||||
|
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
|
||||||
|
|
||||||
|
Or visit the following URL, replacing NNNNNN with the revision number:
|
||||||
|
|
||||||
|
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
|
||||||
|
|
||||||
|
VII. References
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5674>
|
||||||
|
|
||||||
|
The latest revision of this advisory is available at
|
||||||
|
<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-15:19.routed.asc>
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.6 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAEBCgAGBQJVwoplAAoJEO1n7NZdz2rnMFAP/3HWG6FrFxM3jgMcK7a5+nKP
|
||||||
|
O6BqVXpFdia0UUN5JlcEZXc89957mXdMXCDqNeTj3CeDc0p9GbPX1zV/vlYoOqhM
|
||||||
|
eIPwgERbMRFnDRaWm2ClG+aatJvdpeDEioNy8b8tmKq94JcpXIJnwX8dhY3WrMwj
|
||||||
|
Mc3QBGT08XLImHqNw6d6/0wavFeOZ/3g1ZoloAktsgA9KhTUOai6dUhIbIJzk6gh
|
||||||
|
0oa4NRkhzRNmUKyHOS6HDrghhQ/kZGtE8joVBxLBljK0Thi0mIZtn3UFGsNAgAWw
|
||||||
|
7WGAiTN2o8c48IUJosmiGsJ7rV1wCFt5zXrZVCcnq6dr60He16Z2Zwif2tugiTvm
|
||||||
|
5x9lDbTEnYOTxM38Ya5gMtMf733YgAtoRCkf3ROsnwXukJYVsJXms7Ej4NihoKMd
|
||||||
|
aYOLDItl+AXUGIyQ44GuUm2955wo9Fb5RlkDSCLAvdgnkPk+k0puLp0MR0B2MOAI
|
||||||
|
tdKNecRNg0fDR5gJbfdzdjVhsGBZXdYlxo4VjXUXDSZJ+8+jkAg2LA9DTRKIfbgX
|
||||||
|
BX5GiOhkhIivFlgvSePv0LRuIbgt0H1cxiJdk6OqNS5gROuqwo7wwUnaig8KVKOI
|
||||||
|
887gfpf7PepYD4xWTo3nAoEcGM0rBwUyq1X3pbx9OJADcqRvOhxfMcHFcCv75uxa
|
||||||
|
OISkQhkWdZUv6ls76rRu
|
||||||
|
=p5Rl
|
||||||
|
-----END PGP SIGNATURE-----
|
57
share/security/patches/SA-15:18/bsdpatch.patch
Normal file
57
share/security/patches/SA-15:18/bsdpatch.patch
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
Index: usr.bin/patch/pathnames.h
|
||||||
|
===================================================================
|
||||||
|
--- usr.bin/patch/pathnames.h (revision 286254)
|
||||||
|
+++ usr.bin/patch/pathnames.h (working copy)
|
||||||
|
@@ -9,4 +9,4 @@
|
||||||
|
|
||||||
|
#include <paths.h>
|
||||||
|
|
||||||
|
-#define _PATH_ED "/bin/ed"
|
||||||
|
+#define _PATH_RED "/bin/red"
|
||||||
|
Index: usr.bin/patch/pch.c
|
||||||
|
===================================================================
|
||||||
|
--- usr.bin/patch/pch.c (revision 286254)
|
||||||
|
+++ usr.bin/patch/pch.c (working copy)
|
||||||
|
@@ -1,4 +1,3 @@
|
||||||
|
-
|
||||||
|
/*-
|
||||||
|
* Copyright 1986, Larry Wall
|
||||||
|
*
|
||||||
|
@@ -1409,6 +1408,7 @@ do_ed_script(void)
|
||||||
|
char *t;
|
||||||
|
off_t beginning_of_this_line;
|
||||||
|
FILE *pipefp = NULL;
|
||||||
|
+ int continuation;
|
||||||
|
|
||||||
|
if (!skip_rest_of_patch) {
|
||||||
|
if (copy_file(filearg[0], TMPOUTNAME) < 0) {
|
||||||
|
@@ -1415,7 +1415,7 @@ do_ed_script(void)
|
||||||
|
unlink(TMPOUTNAME);
|
||||||
|
fatal("can't create temp file %s", TMPOUTNAME);
|
||||||
|
}
|
||||||
|
- snprintf(buf, buf_size, "%s%s%s", _PATH_ED,
|
||||||
|
+ snprintf(buf, buf_size, "%s%s%s", _PATH_RED,
|
||||||
|
verbose ? " " : " -s ", TMPOUTNAME);
|
||||||
|
pipefp = popen(buf, "w");
|
||||||
|
}
|
||||||
|
@@ -1433,7 +1433,19 @@ do_ed_script(void)
|
||||||
|
(*t == 'a' || *t == 'c' || *t == 'd' || *t == 'i' || *t == 's')) {
|
||||||
|
if (pipefp != NULL)
|
||||||
|
fputs(buf, pipefp);
|
||||||
|
- if (*t != 'd') {
|
||||||
|
+ if (*t == 's') {
|
||||||
|
+ for (;;) {
|
||||||
|
+ continuation = 0;
|
||||||
|
+ t = strchr(buf, '\0') - 1;
|
||||||
|
+ while (--t >= buf && *t == '\\')
|
||||||
|
+ continuation = !continuation;
|
||||||
|
+ if (!continuation ||
|
||||||
|
+ pgets(true) == 0)
|
||||||
|
+ break;
|
||||||
|
+ if (pipefp != NULL)
|
||||||
|
+ fputs(buf, pipefp);
|
||||||
|
+ }
|
||||||
|
+ } else if (*t != 'd') {
|
||||||
|
while (pgets(true)) {
|
||||||
|
p_input_line++;
|
||||||
|
if (pipefp != NULL)
|
17
share/security/patches/SA-15:18/bsdpatch.patch.asc
Normal file
17
share/security/patches/SA-15:18/bsdpatch.patch.asc
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.6 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAABCgAGBQJVwoqMAAoJEO1n7NZdz2rnGmIP/2c1n/1iGLa0zLO1GHMP7Fuu
|
||||||
|
RCjmhJs2EWNnItUevHAf8kv5fYw9re3Dmn+zRPAEQw2ElmaEl7RIbT4ciG33n+ax
|
||||||
|
nn2CaqaRbwHmVtCQhvWAy0Rb8DOl0zvdw2eJxj4UxqTrXex7IDIZgdKJX5JtkY/A
|
||||||
|
W8w5ZB5x/7f6lcVUv85wUiBCYKCdrUFyfxwxeqUuCZ1fXhX5Y/7eDEZW7OmAox3R
|
||||||
|
6y87nwucjaisnctSeMSL8xRsIPW2P9wsIHxWm/8ixWsC7rdhRIBqtIpLTBO+jZEI
|
||||||
|
W87nUUL082nFKp3bvMHnCc2gtwhBu0VzFpCEAXD/ggotOXvMDx+d0td0BFnRcmZZ
|
||||||
|
xly4bED85SGz6RbS06eDB3ZG0aOzRzpm7PNRrzR/YDkbbadOprVJvMWav1iCurvJ
|
||||||
|
rf3ABrgt4Vb8aN5reAwmUjmDesNy6CP5u9UimFEUF+fWrwFvLiGkTl6NkHTCBP34
|
||||||
|
HWAX4FpeeJbvt0yYJS+8+nv2qns0myd+UQjc9OjOMDTcw1DX9RoBBTe+K3JQlslx
|
||||||
|
uZwek6v/ahT2yblN92x2Di8ayEwQlRsPkKAKKFYtfwO6hRrQtYkPDwNSZ+MnQF1v
|
||||||
|
LbO2L1d3TZWGjdPnS4AvFLTQd+ckSFAldMsF46nB7Nf45RYV3f9lnb0COk0UPvYI
|
||||||
|
U3gKJ20S8tAF+VO7hZZV
|
||||||
|
=DXel
|
||||||
|
-----END PGP SIGNATURE-----
|
17
share/security/patches/SA-15:19/routed.patch
Normal file
17
share/security/patches/SA-15:19/routed.patch
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
Index: sbin/routed/input.c
|
||||||
|
===================================================================
|
||||||
|
--- sbin/routed/input.c (revision 286262)
|
||||||
|
+++ sbin/routed/input.c (working copy)
|
||||||
|
@@ -160,6 +160,12 @@ input(struct sockaddr_in *from, /* received from
|
||||||
|
|
||||||
|
trace_rip("Recv", "from", from, sifp, rip, cc);
|
||||||
|
|
||||||
|
+ if (sifp == 0) {
|
||||||
|
+ trace_pkt(" discard a request from an indirect router"
|
||||||
|
+ " (possibly an attack)");
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (rip->rip_vers == 0) {
|
||||||
|
msglim(&bad_router, FROM_NADDR,
|
||||||
|
"RIP version 0, cmd %d, packet received from %s",
|
17
share/security/patches/SA-15:19/routed.patch.asc
Normal file
17
share/security/patches/SA-15:19/routed.patch.asc
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.6 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAABCgAGBQJVwoqMAAoJEO1n7NZdz2rnWTMP/Rs3RWs7vpS5kjD46iM5KZv9
|
||||||
|
BY011+7N5uaa9yxCIBXe2KwjRbmzd480eU3nfOMZh3XHo/aehAyJdI4QtnFCXFLq
|
||||||
|
5+JnixcfHmVjtNvrjz29OyRi6Y9E9biW9M2yTisGdNjM5aYMlPNBhi+eSoB0QfLa
|
||||||
|
H5q7tDM6h/iuotXbJtqzTHRLb+TuFTieSyDndFLX9Dk5CFi7vTZeCkV2qSm2uVFi
|
||||||
|
msBrWSckl6F/wrWjJkvB4khPdzdBKslG4m2mxfIRLEUM2V31CTmqmyJiNhjHXL4U
|
||||||
|
JW+3uq02jz+zYHuMf6IxpEB5eK6JaieqaQhaTzyGQd6XImRtXp9T3wEyuahm+s0C
|
||||||
|
pBnO4ky+/oTWqwcAGjEdAwxXw1IL594ZcZIpbTdSNhRApNWRXyk08uS9ktP3W/kV
|
||||||
|
eOZW6HB19oJipyNZE3zCFHDInUMh6OMWQFxKpOBxYid08vYy8bKhXLG+Di+ddfnF
|
||||||
|
6ITFHLetyw0RT306gHm1GGbHY8SkuZpsqo67R8fUOilsc5RE9J0qJg3BRYmIzhbA
|
||||||
|
I+JkXpZ33Wxi9BO8nPdZxTC7UylKJT1Nd6rk511gAtKjta2dZvoisFIQ0XxIVBdC
|
||||||
|
vLO0pferZj4jDEkAlaH8UlmHGl483oRW7P4OfpLWlxZ2imWH2LTh/mxEDiJMqAjR
|
||||||
|
6Cf6RRTd14yoQha24Osf
|
||||||
|
=wxDr
|
||||||
|
-----END PGP SIGNATURE-----
|
|
@ -7,6 +7,22 @@
|
||||||
<year>
|
<year>
|
||||||
<name>2015</name>
|
<name>2015</name>
|
||||||
|
|
||||||
|
<month>
|
||||||
|
<name>8</name>
|
||||||
|
|
||||||
|
<day>
|
||||||
|
<name>5</name>
|
||||||
|
|
||||||
|
<advisory>
|
||||||
|
<name>FreeBSD-SA-15:19.routed</name>
|
||||||
|
</advisory>
|
||||||
|
|
||||||
|
<advisory>
|
||||||
|
<name>FreeBSD-SA-15:18.bsdpatch</name>
|
||||||
|
</advisory>
|
||||||
|
</day>
|
||||||
|
</month>
|
||||||
|
|
||||||
<month>
|
<month>
|
||||||
<name>7</name>
|
<name>7</name>
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue