Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Mar 2024 08:51:58 -0600
From:      Alan Somers <asomers@freebsd.org>
To:        freebsd-stable@freebsd.org
Subject:   Re: FreeBSD Errata Notice FreeBSD-EN-24:08.kerberos
Message-ID:  <CAOtMX2imf-mfFYvOvH3pDmCVUNrKePF0STNKU7rw-pE_V09nvg@mail.gmail.com>
In-Reply-To: <20240328075045.EFBA13437@freefall.freebsd.org>
References:  <20240328075045.EFBA13437@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Mar 28, 2024 at 1:56=E2=80=AFAM FreeBSD Errata Notices
<errata-notices@freebsd.org> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> FreeBSD-EN-24:08.kerberos                                       Errata No=
tice
>                                                           The FreeBSD Pro=
ject
>
> Topic:          Kerberos segfaults when using weak crypto
>
> Category:       contrib
> Module:         heimdal
> Announced:      2024-03-28
> Affects:        FreeBSD 14.0
> Corrected:      2024-01-22 15:49:24 UTC (stable/14, 14.0-STABLE)
>                 2024-03-28 05:06:25 UTC (releng/14.0, 14.0-RELEASE-p6)
>
> For general information regarding FreeBSD Errata Notices and Security
> Advisories, including descriptions of the fields above, security
> branches, and the following sections, please visit
> <URL:https://security.FreeBSD.org/>.
>
> I.   Background
>
> FreeBSD includes Heimdal, an implementation of ASN.1/DER, PKIX, and Kerbe=
ros.
> It uses OpenSSL to provide a number of cryptographic routines.
>
> II.  Problem Description
>
> Weak crypto is provided by the openssl "legacy" provider which is not loa=
ded
> by default.
>
> III. Impact
>
> Attempting to use weak crypto routines when the legacy provider is not lo=
aded
> results in the application crashing.
>
> IV.  Workaround
>
> Edit /etc/ssl/openssl.cnf to load the legacy provider unconditionally.
>
> V.   Solution
>
> Upgrade your system to a supported FreeBSD stable or release / security
> branch (releng) dated after the correction date.
>
> Perform one of the following:
>
> 1) To update your system via a binary patch:
>
> Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platfo=
rms,
> or the i386 platform on FreeBSD 13, can be updated via the freebsd-update=
(8)
> utility:
>
> # freebsd-update fetch
> # freebsd-update install
>
> 2) To update your system via a source code patch:
>
> The following patches have been verified to apply to the applicable
> FreeBSD release branches.
>
> a) Download the relevant patch from the location below, and verify the
> detached PGP signature using your PGP utility.
>
> # fetch https://security.FreeBSD.org/patches/EN-24:08/kerberos.patch
> # fetch https://security.FreeBSD.org/patches/EN-24:08/kerberos.patch.asc
> # gpg --verify kerberos.patch.asc
>
> b) Apply the patch.  Execute the following commands as root:
>
> # cd /usr/src
> # patch < /path/to/patch
>
> c) Recompile the operating system using buildworld and installworld as
> described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
>
> Restart all daemons that use the library, or reboot the system.
>
> VI.  Correction details
>
> This issue is corrected as of the corresponding Git commit hash in the
> following stable and release branches:
>
> Branch/path                             Hash                     Revision
> - -----------------------------------------------------------------------=
--
> stable/14/                              c7db2e15e404    stable/14-n266467
> releng/14.0/                            c48fe39ad139  releng/14.0-n265415
> - -----------------------------------------------------------------------=
--
>
> Run the following command to see which files were modified by a
> particular commit:
>
> # git show --stat <commit hash>
>
> Or visit the following URL, replacing NNNNNN with the hash:
>
> <URL:https://cgit.freebsd.org/src/commit/?id=3DNNNNNN>;
>
> To determine the commit count in a working tree (for comparison against
> nNNNNNN in the table above), run:
>
> # git rev-list --count --first-parent HEAD
>
> VII. References
>
> <other info on the problem>
>
> <URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272835>;
>
> The latest revision of this advisory is available at
> <URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-24:08.kerberos.as=
c>
> -----BEGIN PGP SIGNATURE-----
>
> iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmYFGawACgkQbljekB8A
> Gu9Euw/+LX8qcrGUvA11MNOVemD+SEH/Ol97L4gLHhzGlWSf3VMq5F1KtY0VRwGK
> ykM3VsSAk3PoYHLn+jbHPuAMjJVym+MLg27ZZWlqnx2Z7/wk2KuAb9RVCUl4FnPy
> eTXzBNt3tCSYa2ZCRWEH+uN6dZh4o8VP0DWfrNdaazH7R7ezRmTzirvcQ39MXTcE
> 8wI+zQedVZG4OSuqOSFY21d70nlzqgs6ThY3K6KrtcaQGfenYBSQgFmjMJlBqtrb
> Mr1Yvgc+wE66Ara/Hz+/2L11bwjyFwT1dpO57DKrcyTaGTnSYiDQiDscUIAW0gCh
> bUMCgWCHq+kk7pAyUIMlRbdrA/6N/wmvwP/iO6GGxYmN0lNX8udxeZWz3OPPnbif
> anM5OGnvKFkkTzCqnpHumljolvJL0/VeD7XCNBBgWa1I46gFmmNZ7R2esm7UEdU8
> IR4Hk9EqGhfl+EwU7OW04/Hq3br667kXbVsq1TTVM4ht39K+WhVoxzirp7QzOGTJ
> WjRq6DK+44PyhQgnnAJgM/4gOGr5O/Y3ezRx4uj1S9L9faXTC5xlT8Vw78xU2wXq
> BjG7vXi5r9d4POjtRcNiaMVKXQPF/saGjHcPGrGnuBLC8AFG54bFycmvM5QzWqng
> AeRFOg+O8lkxLoQMDqJsNt8OMIk7vZHguwL7pt0tRtouuoaszU0=3D
> =3DUnED
> -----END PGP SIGNATURE-----

Cherry-picking the suggested hash doesn't work.  It produces a merge
conflict.  It looks like a second change is needed too:
aaf2c7fdb81a1dd9de9fc77c9313f4e60e68fa76 .  Should we update the
advisory to include both?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAOtMX2imf-mfFYvOvH3pDmCVUNrKePF0STNKU7rw-pE_V09nvg>