Commit revised advisory for 13:06.mmap.

This commit is contained in:
Xin LI 2013-06-21 21:41:48 +00:00
parent 5a760f9fd8
commit bf1c404ec6
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=41998

View file

@ -13,14 +13,20 @@ Announced: 2013-06-18
Credits: Konstantin Belousov
Alan Cox
Affects: FreeBSD 9.0 and later
Corrected: 2013-06-18 09:04:19 UTC (stable/9, 9.1-STABLE)
2013-06-18 09:05:51 UTC (releng/9.1, 9.1-RELEASE-p4)
Corrected: 2013-06-18 07:04:19 UTC (stable/9, 9.1-STABLE)
2013-06-18 07:05:51 UTC (releng/9.1, 9.1-RELEASE-p4)
CVE Name: CVE-2013-2171
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.
0. Revision History
v1.0 2013-06-18 Initial release.
v1.1 2013-06-21 Corrected correction date.
Added workaround information.
I. Background
The FreeBSD virtual memory system allows files to be memory-mapped.
@ -51,7 +57,23 @@ arbitrary code with user privileges on the target system.
IV. Workaround
No workaround is available.
Systems that do not allow unprivileged users to use the ptrace(2)
system call are not vulnerable, this can be accomplished by setting
the sysctl variable security.bsd.unprivileged_proc_debug to zero.
Please note that this will also prevent debugging tools, for instance
gdb, truss, procstat, as well as some built-in debugging facilities in
certain scripting language like PHP, etc., from working for unprivileged
users.
The following command will set the sysctl accordingly and works until the
next reboot of the system:
sysctl security.bsd.unprivileged_proc_debug=0
To make this change persistent across reboot, the system administrator
should also add the setting into /etc/sysctl.conf:
echo 'security.bsd.unprivileged_proc_debug=0' >> /etc/sysctl.conf
V. Solution
@ -112,16 +134,13 @@ Or visit the following URL, replacing XXXXXX with the revision number:
VII. References
<other info on vulnerability>
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2171>
The latest revision of this advisory is available at
<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-13:06.mmap.asc>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (FreeBSD)
iEYEARECAAYFAlHAB+YACgkQFdaIBMps37IjFACdFSoiYO1YkcPunLh7Zw4TC6MF
X9MAnjjVWB2uEl60Rl3K4WOuJ71AVNlP
=8309
iEYEARECAAYFAlHExy0ACgkQFdaIBMps37L8PwCdGXatzPm7OWjZu+GmbbXQC16/
8sgAoJ0LEmREO8Mp7f4YcLHAEwgnJtjT
=WRZD
-----END PGP SIGNATURE-----