patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			159 lines
		
	
	
	
		
			6.2 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			159 lines
		
	
	
	
		
			6.2 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
-----BEGIN PGP SIGNED MESSAGE-----
 | 
						|
Hash: SHA1
 | 
						|
 | 
						|
=============================================================================
 | 
						|
FreeBSD-SA-10:06.nfsclient                                  Security Advisory
 | 
						|
                                                          The FreeBSD Project
 | 
						|
 | 
						|
Topic:          Unvalidated input in nfsclient
 | 
						|
 | 
						|
Category:       core
 | 
						|
Module:         nfsclient
 | 
						|
Announced:      2010-05-27
 | 
						|
Credits:        Patroklos Argyroudis
 | 
						|
Affects:        FreeBSD 7.2 and later.
 | 
						|
Corrected:      2010-05-27 03:15:04 UTC (RELENG_8, 8.1-PRERELEASE)
 | 
						|
                2010-05-27 03:15:04 UTC (RELENG_8_0, 8.0-RELEASE-p3)
 | 
						|
                2010-05-27 03:15:04 UTC (RELENG_7, 7.3-STABLE)
 | 
						|
                2010-05-27 03:15:04 UTC (RELENG_7_3, 7.3-RELEASE-p1)
 | 
						|
                2010-05-27 03:15:04 UTC (RELENG_7_2, 7.2-RELEASE-p8)
 | 
						|
CVE Name:       CVE-2010-2020
 | 
						|
 | 
						|
For general information regarding FreeBSD Security Advisories,
 | 
						|
including descriptions of the fields above, security branches, and the
 | 
						|
following sections, please visit <URL:http://security.FreeBSD.org/>.
 | 
						|
 | 
						|
I.   Background
 | 
						|
 | 
						|
The Network File System (NFS) allows a host to export some or all of its
 | 
						|
file systems so that other hosts can access them over the network and mount
 | 
						|
them as if they were on local disks.  FreeBSD includes server and client
 | 
						|
implementations of NFS.
 | 
						|
 | 
						|
II.  Problem Description
 | 
						|
 | 
						|
The NFS client subsystem fails to correctly validate the length of a
 | 
						|
parameter provided by the user when a filesystem is mounted.
 | 
						|
 | 
						|
III. Impact
 | 
						|
 | 
						|
A user who can mount filesystems can execute arbitrary code in the kernel.
 | 
						|
On systems where the non-default vfs.usermount feature has been enabled,
 | 
						|
unprivileged users may be able to gain superuser ("root") privileges.
 | 
						|
 | 
						|
IV.  Workaround
 | 
						|
 | 
						|
Do not allow untrusted users to mount filesystems.  To prevent unprivileged
 | 
						|
users from mounting filesystems, set the vfs.usermount sysctl variable to
 | 
						|
zero:
 | 
						|
 | 
						|
# sysctl vfs.usermount=0
 | 
						|
 | 
						|
Note that the default value of this variable is zero, i.e., FreeBSD is not
 | 
						|
affected by this vulnerability in its default configuration, and FreeBSD
 | 
						|
system administrators are strongly encouraged not to change this setting.
 | 
						|
 | 
						|
V.   Solution
 | 
						|
 | 
						|
NOTE WELL: Even with this fix allowing users to mount arbitrary media
 | 
						|
should not be considered safe.  Most of the file systems in FreeBSD were
 | 
						|
not built to protect safeguard against malicious devices.  While such bugs
 | 
						|
in file systems are fixed when found, a complete audit has not been
 | 
						|
perfomed on the file system code.
 | 
						|
 | 
						|
Perform one of the following:
 | 
						|
 | 
						|
1) Upgrade your vulnerable system to 7-STABLE or 8-STABLE, or to the
 | 
						|
RELENG_8_0, RELENG_7_3, or RELENG_7_2 security branch dated after the
 | 
						|
correction date.
 | 
						|
 | 
						|
2) To update your vulnerable system via a source code patch:
 | 
						|
 | 
						|
The following patches have been verified to apply to FreeBSD 7.2, 7.3
 | 
						|
and 8.0 systems.
 | 
						|
 | 
						|
a) Download the relevant patch from the location below, and verify the
 | 
						|
detached PGP signature using your PGP utility.
 | 
						|
 | 
						|
# fetch http://security.FreeBSD.org/patches/SA-10:06/nfsclient.patch
 | 
						|
# fetch http://security.FreeBSD.org/patches/SA-10:06/nfsclient.patch.asc
 | 
						|
 | 
						|
b) Apply the patch.
 | 
						|
 | 
						|
# cd /usr/src
 | 
						|
# patch < /path/to/patch
 | 
						|
 | 
						|
c) Recompile your kernel as described in
 | 
						|
<URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
 | 
						|
system.
 | 
						|
 | 
						|
3) To update your vulnerable system via a binary patch:
 | 
						|
 | 
						|
Systems running 7.2-RELEASE, 7.3-RELEASE, or 8.0-RELEASE on the i386 or
 | 
						|
amd64 platforms can be updated via the freebsd-update(8) utility:
 | 
						|
 | 
						|
# freebsd-update fetch
 | 
						|
# freebsd-update install
 | 
						|
 | 
						|
VI.  Correction details
 | 
						|
 | 
						|
The following list contains the revision numbers of each file that was
 | 
						|
corrected in FreeBSD.
 | 
						|
 | 
						|
CVS:
 | 
						|
 | 
						|
Branch                                                           Revision
 | 
						|
  Path
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
RELENG_7
 | 
						|
  src/sys/nfsclient/nfs_vfsops.c                                1.193.2.7
 | 
						|
  src/lib/libc/sys/mount.2                                       1.45.2.1
 | 
						|
RELENG_7_3
 | 
						|
  src/UPDATING                                             1.507.2.34.2.3
 | 
						|
  src/sys/conf/newvers.sh                                   1.72.2.16.2.5
 | 
						|
  src/sys/nfsclient/nfs_vfsops.c                            1.193.2.5.4.2
 | 
						|
  src/lib/libc/sys/mount.2                                      1.45.12.2
 | 
						|
RELENG_7_2
 | 
						|
  src/UPDATING                                            1.507.2.23.2.11
 | 
						|
  src/sys/conf/newvers.sh                                  1.72.2.11.2.12
 | 
						|
  src/sys/nfsclient/nfs_vfsops.c                            1.193.2.5.2.2
 | 
						|
  src/lib/libc/sys/mount.2                                       1.45.8.2
 | 
						|
RELENG_8
 | 
						|
  src/sys/nfsclient/nfs_vfsops.c                                1.226.2.7
 | 
						|
  src/lib/libc/sys/mount.2                                      1.45.10.2
 | 
						|
RELENG_8_0
 | 
						|
  src/UPDATING                                              1.632.2.7.2.6
 | 
						|
  src/sys/conf/newvers.sh                                    1.83.2.6.2.6
 | 
						|
  src/sys/nfsclient/nfs_vfsops.c                            1.226.2.2.2.2
 | 
						|
  src/lib/libc/sys/mount.2                                  1.45.10.1.2.2
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
 | 
						|
Subversion:
 | 
						|
 | 
						|
Branch/path                                                      Revision
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
stable/6/                                                         r208586
 | 
						|
releng/6.4/                                                       r208586
 | 
						|
stable/7/                                                         r208586
 | 
						|
releng/7.3/                                                       r208586
 | 
						|
releng/7.2/                                                       r208586
 | 
						|
releng/7.1/                                                       r208586
 | 
						|
stable/8/                                                         r208586
 | 
						|
releng/8.0/                                                       r208586
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
 | 
						|
VII. References
 | 
						|
 | 
						|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2020
 | 
						|
 | 
						|
http://census-labs.com/news/2010/05/26/freebsd-kernel-nfsclient/
 | 
						|
 | 
						|
The latest revision of this advisory is available at
 | 
						|
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:06.nfsclient.asc
 | 
						|
-----BEGIN PGP SIGNATURE-----
 | 
						|
Version: GnuPG v1.4.10 (FreeBSD)
 | 
						|
 | 
						|
iEYEARECAAYFAkv95SUACgkQFdaIBMps37Km5gCdG4RNPkwuDsx05w3CfwLd/aM1
 | 
						|
NusAn0dzFUcuGlMgNb9V43yUFVFa+NbX
 | 
						|
=zMAI
 | 
						|
-----END PGP SIGNATURE-----
 |