patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
98 lines
3.6 KiB
Text
98 lines
3.6 KiB
Text
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
=============================================================================
|
|
FreeBSD-SA-02:30 Security Advisory
|
|
The FreeBSD Project
|
|
|
|
Topic: Users may trace previously privileged processes
|
|
|
|
Category: core
|
|
Module: ktrace
|
|
Announced: 2002-07-12
|
|
Credits: Theo DeRaadt <deraadt@OpenBSD.org>
|
|
Darren Reed <darrenr@FreeBSD.org>
|
|
Affects: All releases prior to and including 4.6-RELEASE
|
|
FreeBSD 4.6-STABLE prior to the correction date
|
|
Corrected: 2002-07-05 22:36:38 UTC (RELENG_4)
|
|
2002-07-11 16:47:41 UTC (RELENG_4_6)
|
|
2002-07-11 16:47:55 UTC (RELENG_4_5)
|
|
2002-07-11 16:56:05 UTC (RELENG_4_4)
|
|
FreeBSD only: NO
|
|
|
|
I. Background
|
|
|
|
The ktrace utility is a debugging tool that allows users to trace
|
|
system calls, I/O, and file system lookup operations executed by or on
|
|
behalf of a process and its children. Since this could potentially
|
|
reveal sensitive information, the kernel will normally only allow a
|
|
user to trace his or her own processes, and will immediately stop
|
|
tracing a process that gains special privileges, for instance by
|
|
executing a setuid or setgid binary. The ktrace utility depends on
|
|
the KTRACE kernel option, which is enabled by default.
|
|
|
|
II. Problem Description
|
|
|
|
If a process that had special privileges were to abandon them, it
|
|
would become possible for the owner of that process to trace it.
|
|
However, that process might still possess and / or communicate
|
|
sensitive information that it had obtained before abandoning its
|
|
privileges, which would then be revealed to the tracing user.
|
|
|
|
III. Impact
|
|
|
|
In theory, local users on systems where ktrace is enabled through
|
|
the KTRACE kernel option might obtain sensitive information, such
|
|
as password files or authentication keys. No specific utility is
|
|
currently known to be vulnerable to this particular problem.
|
|
|
|
IV. Workaround
|
|
|
|
Recompile the kernel without the KTRACE option, and reboot.
|
|
|
|
V. Solution
|
|
|
|
The following patch has been verified to apply to FreeBSD 4.4, 4.5, and
|
|
4.6 systems.
|
|
|
|
a) Download the relevant patch from the location below, and verify the
|
|
detached PGP signature using your PGP utility.
|
|
|
|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:30/ktrace.patch
|
|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:30/ktrace.patch.asc
|
|
|
|
b) Apply the patch.
|
|
|
|
# cd /usr/src
|
|
# patch < /path/to/patch
|
|
|
|
c) Recompile your kernel as described in
|
|
<URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
|
|
system.
|
|
|
|
VI. Correction details
|
|
|
|
The following list contains the revision numbers of each file that was
|
|
corrected in FreeBSD.
|
|
|
|
Path Revision
|
|
Branch
|
|
- -------------------------------------------------------------------------
|
|
src/sys/kern/kern_ktrace.c
|
|
RELENG_4 1.35.2.6
|
|
RELENG_4_6 1.35.2.5.4.1
|
|
RELENG_4_5 1.35.2.5.2.1
|
|
RELENG_4_4 1.35.2.4.4.1
|
|
- -------------------------------------------------------------------------
|
|
|
|
VII. References
|
|
|
|
<URL:http://www.openbsd.org/errata.html#ktrace>
|
|
-----BEGIN PGP SIGNATURE-----
|
|
Version: GnuPG v1.0.7 (FreeBSD)
|
|
|
|
iQCVAwUBPS8+qFUuHi5z0oilAQH+XwQAlGxDecckzp1md5S3S3JfLSkvI3vMHzTw
|
|
nezUkanQ+2M65kj3QUzDnhv+jR0KpgAXCfMIVFUekb+rO8fbxbVygyWZH3T501F/
|
|
5nhoNGwkbTVdjY9x34dSOvVJHNUZ0zn9Y+aQiC5msK4ZyI2GFdrH/Kfa1Ubh7H6z
|
|
w1/J3NNJ5Bs=
|
|
=z5iy
|
|
-----END PGP SIGNATURE-----
|