Add SA-16:08, SA-16:09 and SA-16:10.
This commit is contained in:
parent
5f388dea1d
commit
cf53b9400e
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=48099
10 changed files with 18007 additions and 0 deletions
145
share/security/advisories/FreeBSD-SA-16:08.bind.asc
Normal file
145
share/security/advisories/FreeBSD-SA-16:08.bind.asc
Normal file
|
@ -0,0 +1,145 @@
|
||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
Hash: SHA512
|
||||||
|
|
||||||
|
=============================================================================
|
||||||
|
FreeBSD-SA-16:08.bind Security Advisory
|
||||||
|
The FreeBSD Project
|
||||||
|
|
||||||
|
Topic: BIND remote denial of service vulnerability
|
||||||
|
|
||||||
|
Category: contrib
|
||||||
|
Module: bind
|
||||||
|
Announced: 2016-01-27
|
||||||
|
Credits: ISC
|
||||||
|
Affects: FreeBSD 9.x
|
||||||
|
Corrected: 2016-01-20 08:54:35 UTC (stable/9, 9.3-STABLE)
|
||||||
|
2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35)
|
||||||
|
CVE Name: CVE-2015-8704
|
||||||
|
|
||||||
|
For general information regarding FreeBSD Security Advisories,
|
||||||
|
including descriptions of the fields above, security branches, and the
|
||||||
|
following sections, please visit <URL:https://security.FreeBSD.org/>.
|
||||||
|
|
||||||
|
I. Background
|
||||||
|
|
||||||
|
BIND 9 is an implementation of the Domain Name System (DNS) protocols.
|
||||||
|
The named(8) daemon is an Internet Domain Name Server.
|
||||||
|
|
||||||
|
Address Prefixes List (APL RR) is a type of DNS Resource Record defined in
|
||||||
|
RFC 3123.
|
||||||
|
|
||||||
|
II. Problem Description
|
||||||
|
|
||||||
|
There is an off-by-one error in a buffer size check when performing certain
|
||||||
|
string formatting operations.
|
||||||
|
|
||||||
|
III. Impact
|
||||||
|
|
||||||
|
Slaves using text-format db files could be vulnerable if receiving a
|
||||||
|
malformed record in a zone transfer from their master.
|
||||||
|
|
||||||
|
Masters using text-format db files could be vulnerable if they accept
|
||||||
|
a malformed record in a DDNS update message.
|
||||||
|
|
||||||
|
Recursive resolvers are potentially vulnerable when debug logging is
|
||||||
|
enabled and if they are fed a deliberately malformed record by a
|
||||||
|
malicious server.
|
||||||
|
|
||||||
|
A server which has cached a specially constructed record could encounter
|
||||||
|
this condition while performing 'rndc dumpdb'.
|
||||||
|
|
||||||
|
IV. Workaround
|
||||||
|
|
||||||
|
No workaround is available, but hosts not running named(8) are not
|
||||||
|
vulnerable.
|
||||||
|
|
||||||
|
V. Solution
|
||||||
|
|
||||||
|
Perform one of the following:
|
||||||
|
|
||||||
|
1) Upgrade your vulnerable system to a supported FreeBSD stable or
|
||||||
|
release / security branch (releng) dated after the correction date.
|
||||||
|
|
||||||
|
The named service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
2) To update your vulnerable system via a binary patch:
|
||||||
|
|
||||||
|
Systems running a RELEASE version of FreeBSD on the i386 or amd64
|
||||||
|
platforms can be updated via the freebsd-update(8) utility:
|
||||||
|
|
||||||
|
# freebsd-update fetch
|
||||||
|
# freebsd-update install
|
||||||
|
|
||||||
|
The named service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
3) To update your vulnerable system via a source code patch:
|
||||||
|
|
||||||
|
The following patches have been verified to apply to the applicable
|
||||||
|
FreeBSD release branches.
|
||||||
|
|
||||||
|
a) Download the relevant patch from the location below, and verify the
|
||||||
|
detached PGP signature using your PGP utility.
|
||||||
|
|
||||||
|
[FreeBSD 9.3]
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:08/bind.patch
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:08/bind.patch.asc
|
||||||
|
# gpg --verify bind.patch.asc
|
||||||
|
|
||||||
|
b) Apply the patch. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src
|
||||||
|
# patch < /path/to/patch
|
||||||
|
|
||||||
|
c) Recompile the operating system using buildworld and installworld as
|
||||||
|
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
|
||||||
|
|
||||||
|
Restart the applicable daemons, or reboot the system.
|
||||||
|
|
||||||
|
VI. Correction details
|
||||||
|
|
||||||
|
The following list contains the correction revision numbers for each
|
||||||
|
affected branch.
|
||||||
|
|
||||||
|
Branch/path Revision
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
stable/9/ r294405
|
||||||
|
releng/9.3/ r294905
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
|
||||||
|
To see which files were modified by a particular revision, run the
|
||||||
|
following command, replacing NNNNNN with the revision number, on a
|
||||||
|
machine with Subversion installed:
|
||||||
|
|
||||||
|
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
|
||||||
|
|
||||||
|
Or visit the following URL, replacing NNNNNN with the revision number:
|
||||||
|
|
||||||
|
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
|
||||||
|
|
||||||
|
VII. References
|
||||||
|
|
||||||
|
<URL:https://kb.isc.org/article/AA-01335>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704>
|
||||||
|
|
||||||
|
The latest revision of this advisory is available at
|
||||||
|
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:08.bind.asc>
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rngIkP/Ru1a5U14/iJKqGO2o+OQkk5
|
||||||
|
j9G3rwEQROlPhtHdUE3vtA2fZcsayJaK1CjU3j91VWlTXHfBnju6gbJVPntNQqe5
|
||||||
|
TxRFmRhRjcyreNdt6hKvFgDrXmWwrytRukJ/XafdYxoWFDTtrUScwrOH87U8ILcF
|
||||||
|
gkWgzCQ7EnYqr7sEW1makDHmIOLukJo5pJOnUTRkraDP2oaKSros3GC+Fnh6Wf+q
|
||||||
|
wYOkgl2gj96ubJW4SvdZCAKFtnMrhw0ZZyrVDuPojzWU+ZotzWvZz3xGvoSqXy5U
|
||||||
|
rqqtUQNHMU0Aqhe9zurW4B2ioff6XALZPgRYqQRI8ezXTgDDhJSwa12mjTJuQmaR
|
||||||
|
hQRJlW5u5/Ejj2NML6NkhvLuSApwZcAZ2G7cLGdR6nEKKVEb6mXgnL7T/CdhhTj8
|
||||||
|
2owIz1iIdI2sUmhv6vuxPxB1k/O7b76LTZ2AL6jx4/mEtOVeofpNej5w7qnvCSqV
|
||||||
|
RcZsOYRXrMZ0YWuhBkKqnMGGIU0TBMDvjJL5gxf5RR14iLExcC1fKhkhbvRMag4Y
|
||||||
|
ck7Ja45Ltpwtd0t7/AfzbeI4OVmos4NB36HK5pYJchmOUavm6im5V6781mYGZgQn
|
||||||
|
HtOQEyi7tSeft+Fz21dmK6Z1GV6lRmrt52wAKyJ71nA/WESgma50WE49RX+cH1MH
|
||||||
|
nmon5PYKLuMuzFVNYZWs
|
||||||
|
=HYpu
|
||||||
|
-----END PGP SIGNATURE-----
|
225
share/security/advisories/FreeBSD-SA-16:09.ntp.asc
Normal file
225
share/security/advisories/FreeBSD-SA-16:09.ntp.asc
Normal file
|
@ -0,0 +1,225 @@
|
||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
Hash: SHA512
|
||||||
|
|
||||||
|
=============================================================================
|
||||||
|
FreeBSD-SA-16:09.ntp Security Advisory
|
||||||
|
The FreeBSD Project
|
||||||
|
|
||||||
|
Topic: Multiple vulnerabilities of ntp
|
||||||
|
|
||||||
|
Category: contrib
|
||||||
|
Module: ntp
|
||||||
|
Announced: 2016-01-27
|
||||||
|
Credits: Cisco ASIG / Network Time Foundation
|
||||||
|
Affects: All supported versions of FreeBSD.
|
||||||
|
Corrected: 2016-01-22 15:55:21 UTC (stable/10, 10.2-STABLE)
|
||||||
|
2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11)
|
||||||
|
2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28)
|
||||||
|
2016-01-22 15:56:35 UTC (stable/9, 9.3-STABLE)
|
||||||
|
2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35)
|
||||||
|
CVE Name: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976,
|
||||||
|
CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138,
|
||||||
|
CVE-2015-8139, CVE-2015-8140, CVE-2015-8158
|
||||||
|
|
||||||
|
For general information regarding FreeBSD Security Advisories,
|
||||||
|
including descriptions of the fields above, security branches, and the
|
||||||
|
following sections, please visit <URL:https://security.FreeBSD.org/>.
|
||||||
|
|
||||||
|
I. Background
|
||||||
|
|
||||||
|
The ntpd(8) daemon is an implementation of the Network Time Protocol (NTP)
|
||||||
|
used to synchronize the time of a computer system to a reference time
|
||||||
|
source.
|
||||||
|
|
||||||
|
II. Problem Description
|
||||||
|
|
||||||
|
Multiple vulnerabilities have been discovered in ntp 4.2.8p5:
|
||||||
|
|
||||||
|
Potential Infinite Loop in ntpq. [CVE-2015-8158]
|
||||||
|
|
||||||
|
A logic error would allow packets with an origin timestamp of zero
|
||||||
|
to bypass this check whenever there is not an outstanding request
|
||||||
|
to the server. [CVE-2015-8138]
|
||||||
|
|
||||||
|
Off-path Denial of Service (DoS) attack on authenticated broadcast mode.
|
||||||
|
[CVE-2015-7979]
|
||||||
|
|
||||||
|
Stack exhaustion in recursive traversal of restriction list. [CVE-2015-7978]
|
||||||
|
|
||||||
|
reslist NULL pointer dereference. [CVE-2015-7977]
|
||||||
|
|
||||||
|
ntpq saveconfig command allows dangerous characters in filenames.
|
||||||
|
[CVE-2015-7976]
|
||||||
|
|
||||||
|
nextvar() missing length check. [CVE-2015-7975]
|
||||||
|
|
||||||
|
Skeleton Key: Missing key check allows impersonation between authenticated
|
||||||
|
peers. [CVE-2015-7974]
|
||||||
|
|
||||||
|
Deja Vu: Replay attack on authenticated broadcast mode. [CVE-2015-7973]
|
||||||
|
|
||||||
|
ntpq vulnerable to replay attacks. [CVE-2015-8140]
|
||||||
|
|
||||||
|
Origin Leak: ntpq and ntpdc, disclose origin. [CVE-2015-8139]
|
||||||
|
|
||||||
|
III. Impact
|
||||||
|
|
||||||
|
A malicious NTP server, or an attacker who can conduct MITM attack by
|
||||||
|
intercepting NTP query traffic, may be able to cause a ntpq client to
|
||||||
|
infinitely loop. [CVE-2015-8158]
|
||||||
|
|
||||||
|
A malicious NTP server, or an attacker who can conduct MITM attack by
|
||||||
|
intercepting NTP query traffic, may be able to prevent a ntpd(8) daemon
|
||||||
|
to distinguish between legitimate peer responses from forgeries. This
|
||||||
|
can partially be mitigated by configuring multiple time sources.
|
||||||
|
[CVE-2015-8138]
|
||||||
|
|
||||||
|
An off-path attacker who can send broadcast packets with bad
|
||||||
|
authentication (wrong key, mismatched key, incorrect MAC, etc) to
|
||||||
|
broadcast clients can cause these clients to tear down associations.
|
||||||
|
[CVE-2015-7979]
|
||||||
|
|
||||||
|
An attacker who can send unauthenticated 'reslist' command to a NTP
|
||||||
|
server may cause it to crash, resulting in a denial of service
|
||||||
|
condition due to stack exhaustion [CVE-2015-7978] or a NULL pointer
|
||||||
|
dereference [CVE-2015-7977].
|
||||||
|
|
||||||
|
An attacker who can send 'modify' requests to a NTP server may be
|
||||||
|
able to create file that contain dangerous characters in their name,
|
||||||
|
which could cause dangerous behavior in a later shell invocation.
|
||||||
|
[CVE-2015-7976]
|
||||||
|
|
||||||
|
A remote attacker may be able to crash a ntpq client. [CVE-2015-7975]
|
||||||
|
|
||||||
|
A malicious server which holds a trusted key may be able to
|
||||||
|
impersonate other trusted servers in an authenticated configuration.
|
||||||
|
[CVE-2015-7974]
|
||||||
|
|
||||||
|
A man-in-the-middle attacker or a malicious participant that has the
|
||||||
|
same trusted keys as the victim can replay time packets if the NTP
|
||||||
|
network is configured for broadcast operations. [CVE-2015-7973]
|
||||||
|
|
||||||
|
The ntpq protocol is vulnerable to replay attacks which may be used
|
||||||
|
to e.g. re-establish an association to malicious server. [CVE-2015-8140]
|
||||||
|
|
||||||
|
An attacker who can intercept NTP traffic can easily forge live server
|
||||||
|
responses. [CVE-2015-8139]
|
||||||
|
|
||||||
|
IV. Workaround
|
||||||
|
|
||||||
|
No workaround is available, but systems not running ntpd(8) are not
|
||||||
|
affected. Network administrators are advised to implement BCP-38,
|
||||||
|
which helps to reduce risk associated with the attacks.
|
||||||
|
|
||||||
|
V. Solution
|
||||||
|
|
||||||
|
Perform one of the following:
|
||||||
|
|
||||||
|
1) Upgrade your vulnerable system to a supported FreeBSD stable or
|
||||||
|
release / security branch (releng) dated after the correction date.
|
||||||
|
|
||||||
|
The ntpd service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
2) To update your vulnerable system via a binary patch:
|
||||||
|
|
||||||
|
Systems running a RELEASE version of FreeBSD on the i386 or amd64
|
||||||
|
platforms can be updated via the freebsd-update(8) utility:
|
||||||
|
|
||||||
|
# freebsd-update fetch
|
||||||
|
# freebsd-update install
|
||||||
|
|
||||||
|
The ntpd service has to be restarted after the update. A reboot is
|
||||||
|
recommended but not required.
|
||||||
|
|
||||||
|
3) To update your vulnerable system via a source code patch:
|
||||||
|
|
||||||
|
The following patches have been verified to apply to the applicable
|
||||||
|
FreeBSD release branches.
|
||||||
|
|
||||||
|
a) Download the relevant patch from the location below, and verify the
|
||||||
|
detached PGP signature using your PGP utility.
|
||||||
|
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch.asc
|
||||||
|
# gpg --verify ntp.patch.asc
|
||||||
|
|
||||||
|
b) Apply the patch. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src
|
||||||
|
# patch < /path/to/patch
|
||||||
|
|
||||||
|
c) Recompile the operating system using buildworld and installworld as
|
||||||
|
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
|
||||||
|
|
||||||
|
Restart the applicable daemons, or reboot the system.
|
||||||
|
|
||||||
|
VI. Correction details
|
||||||
|
|
||||||
|
The following list contains the correction revision numbers for each
|
||||||
|
affected branch.
|
||||||
|
|
||||||
|
Branch/path Revision
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
stable/9/ r294570
|
||||||
|
releng/9.3/ r294905
|
||||||
|
stable/10/ r294569
|
||||||
|
releng/10.1/ r294904
|
||||||
|
releng/10.2/ r294904
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
|
||||||
|
To see which files were modified by a particular revision, run the
|
||||||
|
following command, replacing NNNNNN with the revision number, on a
|
||||||
|
machine with Subversion installed:
|
||||||
|
|
||||||
|
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
|
||||||
|
|
||||||
|
Or visit the following URL, replacing NNNNNN with the revision number:
|
||||||
|
|
||||||
|
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
|
||||||
|
|
||||||
|
VII. References
|
||||||
|
|
||||||
|
<URL:http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7973>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7974>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7975>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7976>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7977>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7978>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7979>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8138>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8139>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8140>
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8158>
|
||||||
|
|
||||||
|
The latest revision of this advisory is available at
|
||||||
|
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc>
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rnt9cP/2EtdEPX/oBJXKFWqQv5cwvY
|
||||||
|
C4gmlK5MZok2an330XMPl0RO2RplsIw4Lo4BuUh7HPKhVa5loYasabKrULQ+4Pgv
|
||||||
|
z9INxDTDO8iooHeTeNe/VAb5YcKFrD7sqajdc0cY11rLEw1o53IuULz9wZnczAe/
|
||||||
|
KnHDNUyYaSU2Ep+c3+ADSJqOk3ffhsGDS+0byoOBcUN+66MnBg19/rKomiN5a7Nt
|
||||||
|
XSseoQgYISU8aaJDvPlGoaN/Xm5fnFZaKFlJ4y7h51sYYep0qgjQx+Gdakk0vNbh
|
||||||
|
CwsjpBKqDpFpBcSgdEC/bYHnNpYUTJB/tPmG3YDO5jMWQISKGrrnuMYeh+7PjTDS
|
||||||
|
vCrneztpVBscLG4ZKSlfmhpZ/Jfy31YPXm5P/w8NuA05i13K06P4gG5PKNyUMgsk
|
||||||
|
AZQ4Vg8YlyS0Ci4ufdc+AIQI35QMrKvfecJVu49+sNhUA4PpTe7coEU9dks3Dtaw
|
||||||
|
g2QbfnsEWzJ6RBJcw7aQDSgRoqrVQgMB8IIota+aMzeVurgyFxPm9LASk2RYjhmC
|
||||||
|
Ep283cc+HPUnihKBZTwwkw5iznbmpyRYlPghEc7slgOZCbk9pefnsCMOZAqRW9fZ
|
||||||
|
DUpt+HvZD5BKB4kCAUMIvKGS91cyBFaNcdJhlB8uUx2aP2UJmuzldk+x9K74wWGK
|
||||||
|
lnP0IazzXnWFobfwr+qT
|
||||||
|
=0ZhD
|
||||||
|
-----END PGP SIGNATURE-----
|
140
share/security/advisories/FreeBSD-SA-16:10.linux.asc
Normal file
140
share/security/advisories/FreeBSD-SA-16:10.linux.asc
Normal file
|
@ -0,0 +1,140 @@
|
||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
Hash: SHA512
|
||||||
|
|
||||||
|
=============================================================================
|
||||||
|
FreeBSD-SA-16:10.linux Security Advisory
|
||||||
|
The FreeBSD Project
|
||||||
|
|
||||||
|
Topic: Linux compatibility layer issetugid(2) system call
|
||||||
|
vulnerability
|
||||||
|
|
||||||
|
Category: core
|
||||||
|
Module: kernel
|
||||||
|
Announced: 2016-01-27
|
||||||
|
Credits: Isaac Dunham, Brent Cook, Warner Losh
|
||||||
|
Affects: All supported versions of FreeBSD.
|
||||||
|
Corrected: 2016-01-27 07:28:55 UTC (stable/10, 10.2-STABLE)
|
||||||
|
2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11)
|
||||||
|
2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28)
|
||||||
|
2016-01-27 07:34:23 UTC (stable/9, 9.3-STABLE)
|
||||||
|
2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35)
|
||||||
|
CVE Name: CVE-2016-1883
|
||||||
|
|
||||||
|
For general information regarding FreeBSD Security Advisories,
|
||||||
|
including descriptions of the fields above, security branches, and the
|
||||||
|
following sections, please visit <URL:https://security.FreeBSD.org/>.
|
||||||
|
|
||||||
|
I. Background
|
||||||
|
|
||||||
|
FreeBSD is binary-compatible with the Linux operating system through a
|
||||||
|
loadable kernel module/optional kernel component. The support is
|
||||||
|
provided on amd64 and i386 machines.
|
||||||
|
|
||||||
|
II. Problem Description
|
||||||
|
|
||||||
|
A programming error in the Linux compatibility layer could cause the
|
||||||
|
issetugid(2) system call to return incorrect information.
|
||||||
|
|
||||||
|
III. Impact
|
||||||
|
|
||||||
|
If an application relies on output of the issetugid(2) system call
|
||||||
|
and that information is incorrect, this could lead to a privilege
|
||||||
|
escalation.
|
||||||
|
|
||||||
|
IV. Workaround
|
||||||
|
|
||||||
|
No workaround is available, but systems not using the Linux binary
|
||||||
|
compatibility layer are not vulnerable.
|
||||||
|
|
||||||
|
The following command can be used to test if the Linux binary
|
||||||
|
compatibility layer is loaded:
|
||||||
|
|
||||||
|
# kldstat -m linuxelf
|
||||||
|
|
||||||
|
V. Solution
|
||||||
|
|
||||||
|
Perform one of the following:
|
||||||
|
|
||||||
|
1) Upgrade your vulnerable system to a supported FreeBSD stable or
|
||||||
|
release / security branch (releng) dated after the correction date.
|
||||||
|
|
||||||
|
Reboot the system or unload and reload the linux.ko kernel module.
|
||||||
|
|
||||||
|
2) To update your vulnerable system via a binary patch:
|
||||||
|
|
||||||
|
Systems running a RELEASE version of FreeBSD on the i386 or amd64
|
||||||
|
platforms can be updated via the freebsd-update(8) utility:
|
||||||
|
|
||||||
|
# freebsd-update fetch
|
||||||
|
# freebsd-update install
|
||||||
|
|
||||||
|
Reboot the system or unload and reload the linux.ko kernel module.
|
||||||
|
|
||||||
|
3) To update your vulnerable system via a source code patch:
|
||||||
|
|
||||||
|
The following patches have been verified to apply to the applicable
|
||||||
|
FreeBSD release branches.
|
||||||
|
|
||||||
|
a) Download the relevant patch from the location below, and verify the
|
||||||
|
detached PGP signature using your PGP utility.
|
||||||
|
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:10/linux.patch
|
||||||
|
# fetch https://security.FreeBSD.org/patches/SA-16:10/linux.patch.asc
|
||||||
|
# gpg --verify linux.patch.asc
|
||||||
|
|
||||||
|
b) Apply the patch. Execute the following commands as root:
|
||||||
|
|
||||||
|
# cd /usr/src
|
||||||
|
# patch < /path/to/patch
|
||||||
|
|
||||||
|
c) Recompile your kernel as described in
|
||||||
|
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
|
||||||
|
system.
|
||||||
|
|
||||||
|
VI. Correction details
|
||||||
|
|
||||||
|
The following list contains the correction revision numbers for each
|
||||||
|
affected branch.
|
||||||
|
|
||||||
|
Branch/path Revision
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
stable/9/ r294903
|
||||||
|
releng/9.3/ r294905
|
||||||
|
stable/10/ r294901
|
||||||
|
releng/10.1/ r294904
|
||||||
|
releng/10.2/ r294904
|
||||||
|
- -------------------------------------------------------------------------
|
||||||
|
|
||||||
|
To see which files were modified by a particular revision, run the
|
||||||
|
following command, replacing NNNNNN with the revision number, on a
|
||||||
|
machine with Subversion installed:
|
||||||
|
|
||||||
|
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
|
||||||
|
|
||||||
|
Or visit the following URL, replacing NNNNNN with the revision number:
|
||||||
|
|
||||||
|
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
|
||||||
|
|
||||||
|
VII. References
|
||||||
|
|
||||||
|
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1883>
|
||||||
|
|
||||||
|
The latest revision of this advisory is available at
|
||||||
|
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:10.linux.asc>
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rnsr0QAJtM4C+IgRcRHdNGL7vXp1NP
|
||||||
|
u3sFyktcRGCR0p+lMOaFYPp/Vmu09NglhcaxYFbk4WONVSnZKOuiWsjOL9by/eof
|
||||||
|
77i8bXINlB/8Pp+34KpxDtz5wR3jVAApaL8xvS+/DaKj3RdQ63RrHgtQRTAk+VSO
|
||||||
|
ISAXxF2U/XAcRlmBQ3oOtqeHads6M1LNG/D/I0FgpU2G17QoUpfa+AvOkS1wBw7d
|
||||||
|
mdcnC4NDKKx3QnyD0FTrh4z444PwvE3IQ7OSm7VX4/oOZdH+CC9coLCV1BXALrfA
|
||||||
|
WVmaUMDy8bWiv7JMsda2xl4KhcEx2Y0UN2hGYdMZJubqYcnUknMimW3b2fhsfgl1
|
||||||
|
UaQDD6xv9I4xZqo1NHh4/WiH33PvOmM+U0E6IMb5hTUbfSd0mXOn4yzTP5gJxe4h
|
||||||
|
fPk5ZUj/HTKx6C8ERMknTDdn+ZrLLlQJAoDbipPZkRBMcsgvRYGjKquBnrW9N0z2
|
||||||
|
BUtuLODg/GxMmkQXYV7mT08xw7YLvIbfSwGvlOd/k5hB/0KMTRLBFGd6vc2lZ+CL
|
||||||
|
dseeK59vUK50Arua8qbg6AlOYc9Dga/XeQ753za0zEm7LOXzjr7jlBex/04ZxvE/
|
||||||
|
N4OTxNYlASk1cwBcoytZ8da3D7Vqh7vw7QmUR8lAb/x5ijR1QjCApji+yRupCEG+
|
||||||
|
PGHIMcxSGeBx7Drd1eBE
|
||||||
|
=PyM5
|
||||||
|
-----END PGP SIGNATURE-----
|
22
share/security/patches/SA-16:08/bind.patch
Normal file
22
share/security/patches/SA-16:08/bind.patch
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
Index: contrib/bind9/lib/dns/rdata/in_1/apl_42.c
|
||||||
|
===================================================================
|
||||||
|
--- contrib/bind9/lib/dns/rdata/in_1/apl_42.c (revision 294299)
|
||||||
|
+++ contrib/bind9/lib/dns/rdata/in_1/apl_42.c (working copy)
|
||||||
|
@@ -116,7 +116,7 @@ totext_in_apl(ARGS_TOTEXT) {
|
||||||
|
isc_uint8_t len;
|
||||||
|
isc_boolean_t neg;
|
||||||
|
unsigned char buf[16];
|
||||||
|
- char txt[sizeof(" !64000")];
|
||||||
|
+ char txt[sizeof(" !64000:")];
|
||||||
|
const char *sep = "";
|
||||||
|
int n;
|
||||||
|
|
||||||
|
@@ -140,7 +140,7 @@ totext_in_apl(ARGS_TOTEXT) {
|
||||||
|
isc_region_consume(&sr, 1);
|
||||||
|
INSIST(len <= sr.length);
|
||||||
|
n = snprintf(txt, sizeof(txt), "%s%s%u:", sep,
|
||||||
|
- neg ? "!": "", afi);
|
||||||
|
+ neg ? "!" : "", afi);
|
||||||
|
INSIST(n < (int)sizeof(txt));
|
||||||
|
RETERR(str_totext(txt, target));
|
||||||
|
switch (afi) {
|
17
share/security/patches/SA-16:08/bind.patch.asc
Normal file
17
share/security/patches/SA-16:08/bind.patch.asc
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAABCgAGBQJWqHnkAAoJEO1n7NZdz2rnSzoQALduvw7DCOsGiKYoQgU17nyo
|
||||||
|
iiacv5vRmDx7+43BMsND1SM9kwid9RPZWbAj5lb80g7ZOnluBxAoilmqVWgzs9gb
|
||||||
|
1IkATsf5TTbQcGxYG1wQqx2ahfih0FUIb3Qg1KFMDO3XCPvIMucSAQMtPgq3FdFl
|
||||||
|
A/FGH1+Yls4Aum53ulgR6IuotzaYnxiznxqi5IGhfTrPSZIuVnH4SDubwTrE+0kJ
|
||||||
|
N3SzYc3ilguqOtxwSyBtIMSaqPiXZCBGYKGnR8RzysxhfdP56dBSJHzkNoniexjU
|
||||||
|
4jYD5X+fY6ze04yjgdh/Fat3IgoqjnJ3UJ//lxMWGBrj4xI9JHUAS/jLJpLPnMuI
|
||||||
|
WBL7G2jJXGrBsGwq5imDPuobfQoT8wuXYGfMi14XRc5/cKbQn+JqTGf9zB562NSW
|
||||||
|
ADe26s05zgvYS10+nhbxT7v3gYcB/0U2M6HGbN5t/KCTBGteJJsSo3o2ZEZBdkbe
|
||||||
|
jKnNP8RR2OTAjeCCXYqp8BVO9d+tecOzX/LM5Lj+97iwKKkPkHnOGA9zkyeQdGvt
|
||||||
|
8KxBsub1LRYPR/87WZDZWtdGALaxqgQDj7G1ib0mLCbj2CzOSRa34bS/kvTQ7BtD
|
||||||
|
ca7fhrebvhBVP6MqnYAmmuU+ojqMftx7mTZs+fWWFVLcTiPp9WqP2w0r6A/MlkSq
|
||||||
|
ys1rAAXCj/WvMFopSMzu
|
||||||
|
=kVrg
|
||||||
|
-----END PGP SIGNATURE-----
|
17352
share/security/patches/SA-16:09/ntp.patch
Normal file
17352
share/security/patches/SA-16:09/ntp.patch
Normal file
File diff suppressed because it is too large
Load diff
17
share/security/patches/SA-16:09/ntp.patch.asc
Normal file
17
share/security/patches/SA-16:09/ntp.patch.asc
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAABCgAGBQJWqHnkAAoJEO1n7NZdz2rneC4P/0YjmeW8xqfQGLBIBa9odNPJ
|
||||||
|
JxGegvos/aYLrPP3+m3hFtaWwGjQgO4iPBrniK/DqmzoTUJ2S5zYiGO4ZjZHxAcm
|
||||||
|
d/sxrwb2xtAvHDvjrMGLTxq5wSaI2cMXplp9cF5UlYWSjSL4GcJ+ZiOKWPela0mX
|
||||||
|
fy/Z5kmHA3gL39xS8emfWHyYbLGdyYrmcBxMILC4XfHzr9pUz/a093hobja5xDCR
|
||||||
|
ulHsoW+QwdJJPleGt9bN5Ajtl7ZQqHZn/CAsuZfJE7qx+Cpbyyi5/AkK0jqabBQa
|
||||||
|
mzETADhO0H/EYodAfxe1zFfNwbGZ0bEtIrodQ595jDqpY7ocECn1rTTjV30JgDmx
|
||||||
|
+/N1n4XKVqcNdC9mX0YUQlljaHxlN/LCOJJ4pFn8UKBXptmacY2i6yvgaoyNyMKy
|
||||||
|
jHGr4fACYsOtyA82EDE2t4fd0tZC5uasPtIPyCrCLQZN2otfP47sY7q84cMXbex8
|
||||||
|
q5T1c/PZU8kUjPVmPRmFXpUjEVw5BLxiLtwTusYk/6Kjz9bKXrwa2h0gqZiyedMV
|
||||||
|
5nf8C2xi4dnaYIIQB3txSVN6vhxs5he3vhbuEpfE8qM3qI5N3WKl1d0azMjDN2zM
|
||||||
|
4XUNrdklRI2yIWiun1V71QHKhwZtfZmT3KUYhoXe72zq4OOzN4PDXeaLkPAcaCzC
|
||||||
|
4HSz1ozAqx3i3jJD7crA
|
||||||
|
=X9Vq
|
||||||
|
-----END PGP SIGNATURE-----
|
56
share/security/patches/SA-16:10/linux.patch
Normal file
56
share/security/patches/SA-16:10/linux.patch
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
Index: sys/amd64/linux32/linux32_sysvec.c
|
||||||
|
===================================================================
|
||||||
|
--- sys/amd64/linux32/linux32_sysvec.c (revision 294778)
|
||||||
|
+++ sys/amd64/linux32/linux32_sysvec.c (working copy)
|
||||||
|
@@ -248,6 +248,7 @@ elf_linux_fixup(register_t **stack_base, struct im
|
||||||
|
Elf32_Addr *base;
|
||||||
|
Elf32_Addr *pos, *uplatform;
|
||||||
|
struct linux32_ps_strings *arginfo;
|
||||||
|
+ int issetugid;
|
||||||
|
|
||||||
|
arginfo = (struct linux32_ps_strings *)LINUX32_PS_STRINGS;
|
||||||
|
uplatform = (Elf32_Addr *)((caddr_t)arginfo - linux_szplatform);
|
||||||
|
@@ -258,6 +259,7 @@ elf_linux_fixup(register_t **stack_base, struct im
|
||||||
|
args = (Elf32_Auxargs *)imgp->auxargs;
|
||||||
|
pos = base + (imgp->args->argc + imgp->args->envc + 2);
|
||||||
|
|
||||||
|
+ issetugid = imgp->proc->p_flag & P_SUGID ? 1 : 0;
|
||||||
|
AUXARGS_ENTRY_32(pos, LINUX_AT_HWCAP, cpu_feature);
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -277,7 +279,7 @@ elf_linux_fixup(register_t **stack_base, struct im
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_FLAGS, args->flags);
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_ENTRY, args->entry);
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_BASE, args->base);
|
||||||
|
- AUXARGS_ENTRY_32(pos, LINUX_AT_SECURE, 0);
|
||||||
|
+ AUXARGS_ENTRY_32(pos, LINUX_AT_SECURE, issetugid);
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_UID, imgp->proc->p_ucred->cr_ruid);
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_EUID, imgp->proc->p_ucred->cr_svuid);
|
||||||
|
AUXARGS_ENTRY_32(pos, AT_GID, imgp->proc->p_ucred->cr_rgid);
|
||||||
|
Index: sys/i386/linux/linux_sysvec.c
|
||||||
|
===================================================================
|
||||||
|
--- sys/i386/linux/linux_sysvec.c (revision 294778)
|
||||||
|
+++ sys/i386/linux/linux_sysvec.c (working copy)
|
||||||
|
@@ -244,11 +244,13 @@ elf_linux_fixup(register_t **stack_base, struct im
|
||||||
|
Elf32_Addr *uplatform;
|
||||||
|
struct ps_strings *arginfo;
|
||||||
|
register_t *pos;
|
||||||
|
+ int issetugid;
|
||||||
|
|
||||||
|
KASSERT(curthread->td_proc == imgp->proc,
|
||||||
|
("unsafe elf_linux_fixup(), should be curproc"));
|
||||||
|
|
||||||
|
p = imgp->proc;
|
||||||
|
+ issetugid = imgp->proc->p_flag & P_SUGID ? 1 : 0;
|
||||||
|
arginfo = (struct ps_strings *)p->p_sysent->sv_psstrings;
|
||||||
|
uplatform = (Elf32_Addr *)((caddr_t)arginfo - linux_szplatform);
|
||||||
|
args = (Elf32_Auxargs *)imgp->auxargs;
|
||||||
|
@@ -273,7 +275,7 @@ elf_linux_fixup(register_t **stack_base, struct im
|
||||||
|
AUXARGS_ENTRY(pos, AT_FLAGS, args->flags);
|
||||||
|
AUXARGS_ENTRY(pos, AT_ENTRY, args->entry);
|
||||||
|
AUXARGS_ENTRY(pos, AT_BASE, args->base);
|
||||||
|
- AUXARGS_ENTRY(pos, LINUX_AT_SECURE, 0);
|
||||||
|
+ AUXARGS_ENTRY(pos, LINUX_AT_SECURE, issetugid);
|
||||||
|
AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_ucred->cr_ruid);
|
||||||
|
AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_ucred->cr_svuid);
|
||||||
|
AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_ucred->cr_rgid);
|
17
share/security/patches/SA-16:10/linux.patch.asc
Normal file
17
share/security/patches/SA-16:10/linux.patch.asc
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v2.1.8 (FreeBSD)
|
||||||
|
|
||||||
|
iQIcBAABCgAGBQJWqHnlAAoJEO1n7NZdz2rnCPUP/3VkL6MUy2x0Nw69Ei+aM64T
|
||||||
|
3uuhvv7VPvjdtSmYNBigxTEz8vSyofLN94H4nxXhdaNDCDy4Uixmqq3sN4uOAbCk
|
||||||
|
xMdqQ5Ks1zwesZceZDD0MMuEmIZoOF5+xM22ZtqbS/gjwwKyGjWn8EKSA1Y8sxI8
|
||||||
|
by5jGdaVxIe0A5L9bJlAs4/sdISNKi7KBCNkwLw/lzgprV101eXc/5YnmQNxoFPd
|
||||||
|
URyhMGQiZjNynD/t2L1lqwNwgHPN4I8nXoZLhbG2dh7b1S+7LZU5hapXPAxqQe9X
|
||||||
|
vYyhj4HJhUMJKY+Kp9kNLtj0NiXcynwF3IAYQpBIuiZFt1VAkRN6JIiWOU9hZO+V
|
||||||
|
2l/kcXWYwe4FeNxszIkXgOdgs/BJrh2M8t3w5lDdgkUQr98hopMQLb0Tbzn1rPCL
|
||||||
|
5apBEIycx0JfAm15zadP/6RkaT/Hry9Ql8cP00UXWuLqN44vaFY0uAVlrfNmIHSM
|
||||||
|
1//+UY5dSnuIB4AcmlSu1TVPAIHCagKbKg1564Rv9xQxFYqKDFenmDONTN7gAXm4
|
||||||
|
MhDXuB8nr4XO/l8W0Rw3hCI3x3wV54GRkSEx7pxsFK8xUrY6F5eY24SvYiEfOsYC
|
||||||
|
9c5NJi/HFnG9ZrR3ov2iPxwcbTkub1YPV7kbyg3LYsB9mAMXAxZWi3sOJX5r4geb
|
||||||
|
PmWo0n/1uPD/hC0dRMVB
|
||||||
|
=kZyo
|
||||||
|
-----END PGP SIGNATURE-----
|
|
@ -10,6 +10,22 @@
|
||||||
<month>
|
<month>
|
||||||
<name>1</name>
|
<name>1</name>
|
||||||
|
|
||||||
|
<day>
|
||||||
|
<name>14</name>
|
||||||
|
|
||||||
|
<advisory>
|
||||||
|
<name>FreeBSD-SA-16:10.linux</name>
|
||||||
|
</advisory>
|
||||||
|
|
||||||
|
<advisory>
|
||||||
|
<name>FreeBSD-SA-16:09.ntp</name>
|
||||||
|
</advisory>
|
||||||
|
|
||||||
|
<advisory>
|
||||||
|
<name>FreeBSD-SA-16:08.bind</name>
|
||||||
|
</advisory>
|
||||||
|
</day>
|
||||||
|
|
||||||
<day>
|
<day>
|
||||||
<name>14</name>
|
<name>14</name>
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue