From owner-freebsd-announce@FreeBSD.ORG Fri Oct 2 20:11:56 2009 Return-Path: Delivered-To: freebsd-announce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DE4F4106568D; Fri, 2 Oct 2009 20:11:56 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id CB1278FC15; Fri, 2 Oct 2009 20:11:56 +0000 (UTC) Received: from freefall.freebsd.org (simon@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n92KBuLr003884; Fri, 2 Oct 2009 20:11:56 GMT (envelope-from security-advisories@freebsd.org) Received: (from simon@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n92KBu6H003882; Fri, 2 Oct 2009 20:11:56 GMT (envelope-from security-advisories@freebsd.org) Date: Fri, 2 Oct 2009 20:11:56 GMT Message-Id: <200910022011.n92KBu6H003882@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: simon set sender to security-advisories@freebsd.org using -f From: FreeBSD Security Advisories To: FreeBSD Security Advisories Precedence: bulk Cc: Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-09:13.pipe X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.5 Reply-To: freebsd-security@freebsd.org List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2009 20:11:56 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-09:13.pipe Security Advisory The FreeBSD Project Topic: kqueue pipe race conditions Category: core Module: kern Announced: 2009-10-02 Credits: Przemyslaw Frasunek Affects: FreeBSD 6.x Corrected: 2009-10-02 18:09:56 UTC (RELENG_6, 6.4-STABLE) 2009-10-02 18:09:56 UTC (RELENG_6_4, 6.4-RELEASE-p7) 2009-10-02 18:09:56 UTC (RELENG_6_3, 6.3-RELEASE-p13) For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background Pipes are a form of inter-process communication (IPC) provided by the FreeBSD kernel. kqueue is an event management API that applications can use to monitor pipes and other kernel services. II. Problem Description A race condition exists in the pipe close() code relating to kqueues, causing use-after-free for kernel memory, which may lead to an exploitable NULL pointer vulnerability in the kernel, kernel memory corruption, and other unpredictable results. III. Impact Successful exploitation of the race condition can lead to local kernel privilege escalation, kernel data corruption and/or crash. To exploit this vulnerability, an attacker must be able to run code on the target system. IV. Workaround An errata notice, FreeBSD-EN-09:05.null has been released simultaneously to this advisory, and contains a kernel patch implementing a workaround for a more broad class of vulnerabilities. However, prior to those changes, no workaround is available. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to 6-STABLE, or to the RELENG_6_4, or RELENG_6_3 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 6.3 and 6.4. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch http://security.FreeBSD.org/patches/SA-09:13/pipe.patch # fetch http://security.FreeBSD.org/patches/SA-09:13/pipe.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. CVS: Branch Revision Path - ------------------------------------------------------------------------- RELENG_6 src/sys/kern/kern_event.c 1.93.2.7 src/sys/kern/kern_fork.c 1.252.2.8 src/sys/kern/sys_pipe.c 1.184.2.6 src/sys/sys/event.h 1.32.2.1 src/sys/sys/pipe.h 1.29.2.1 RELENG_6_4 src/UPDATING 1.416.2.40.2.11 src/sys/conf/newvers.sh 1.69.2.18.2.13 src/sys/kern/kern_event.c 1.93.2.6.6.2 src/sys/kern/kern_fork.c 1.252.2.7.4.2 src/sys/kern/sys_pipe.c 1.184.2.4.2.3 src/sys/sys/event.h 1.32.12.2 src/sys/sys/pipe.h 1.29.16.2 RELENG_6_3 src/UPDATING 1.416.2.37.2.18 src/sys/conf/newvers.sh 1.69.2.15.2.17 src/sys/kern/kern_event.c 1.93.2.6.4.1 src/sys/kern/kern_fork.c 1.252.2.7.2.1 src/sys/kern/sys_pipe.c 1.184.2.2.6.3 src/sys/sys/event.h 1.32.10.1 src/sys/sys/pipe.h 1.29.12.1 - ------------------------------------------------------------------------- Subversion: Branch/path Revision - ------------------------------------------------------------------------- stable/6/ r197715 releng/6.4/ r197715 releng/6.3/ r197715 - ------------------------------------------------------------------------- VII. References http://svn.freebsd.org/viewvc/base?view=revision&revision=179243 The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-SA-09:13.pipe.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iD8DBQFKxlthFdaIBMps37IRAlk2AJ9mUrNPd1RMztbzO4w7g+AxosqJzgCgmr5l FKxrbF0G4v9P6SyyfAdVOFY= =TWhC -----END PGP SIGNATURE----- From owner-freebsd-announce@FreeBSD.ORG Fri Oct 2 20:12:04 2009 Return-Path: Delivered-To: freebsd-announce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D8BB110656CA; Fri, 2 Oct 2009 20:12:04 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id BBF9B8FC1F; Fri, 2 Oct 2009 20:12:04 +0000 (UTC) Received: from freefall.freebsd.org (simon@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n92KC4rE003947; Fri, 2 Oct 2009 20:12:04 GMT (envelope-from security-advisories@freebsd.org) Received: (from simon@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n92KC4BJ003945; Fri, 2 Oct 2009 20:12:04 GMT (envelope-from security-advisories@freebsd.org) Date: Fri, 2 Oct 2009 20:12:04 GMT Message-Id: <200910022012.n92KC4BJ003945@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: simon set sender to security-advisories@freebsd.org using -f From: FreeBSD Security Advisories To: FreeBSD Security Advisories Precedence: bulk Cc: Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-09:14.devfs X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.5 Reply-To: freebsd-security@freebsd.org List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2009 20:12:05 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-09:14.devfs Security Advisory The FreeBSD Project Topic: Devfs / VFS NULL pointer race condition Category: core Module: kern Announced: 2009-10-02 Credits: Przemyslaw Frasunek Affects: FreeBSD 6.x and 7.x Corrected: 2009-05-18 10:41:59 UTC (RELENG_7, 7.2-STABLE) 2009-10-02 18:09:56 UTC (RELENG_7_2, 7.2-RELEASE-p4) 2009-10-02 18:09:56 UTC (RELENG_7_1, 7.1-RELEASE-p8) 2009-10-02 18:09:56 UTC (RELENG_6, 6.4-STABLE) 2009-10-02 18:09:56 UTC (RELENG_6_4, 6.4-RELEASE-p7) 2009-10-02 18:09:56 UTC (RELENG_6_3, 6.3-RELEASE-p13) For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The device file system (devfs) provides access to system devices, such as storage devices and serial ports, via the file system namespace. VFS is the Virtual File System, which abstracts file system operations in the kernel from the actual underlying file system. II. Problem Description Due to the interaction between devfs and VFS, a race condition exists where the kernel might dereference a NULL pointer. III. Impact Successful exploitation of the race condition can lead to local kernel privilege escalation, kernel data corruption and/or crash. To exploit this vulnerability, an attacker must be able to run code with user privileges on the target system. IV. Workaround An errata note, FreeBSD-EN-09:05.null has been released simultaneously to this advisory, and contains a kernel patch implementing a workaround for a more broad class of vulnerabilities. However, prior to those changes, no workaround is available. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to 6-STABLE, or 7-STABLE, or to the RELENG_7_2, RELENG_7_1, RELENG_6_4, or RELENG_6_3 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 6.3, 6.4, 7.1, and 7.2 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 6.x] # fetch http://security.FreeBSD.org/patches/SA-09:14/devfs6.patch # fetch http://security.FreeBSD.org/patches/SA-09:14/devfs6.patch.asc [FreeBSD 7.x] # fetch http://security.FreeBSD.org/patches/SA-09:14/devfs7.patch # fetch http://security.FreeBSD.org/patches/SA-09:14/devfs7.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. CVS: Branch Revision Path - ------------------------------------------------------------------------- RELENG_6 src/sys/fs/devfs/devfs_vnops.c 1.114.2.17 RELENG_6_4 src/UPDATING 1.416.2.40.2.11 src/sys/conf/newvers.sh 1.69.2.18.2.13 src/sys/fs/devfs/devfs_vnops.c 1.114.2.16.2.2 RELENG_6_3 src/UPDATING 1.416.2.37.2.18 src/sys/conf/newvers.sh 1.69.2.15.2.17 src/sys/fs/devfs/devfs_vnops.c 1.114.2.15.2.1 RELENG_7 src/sys/fs/devfs/devfs_vnops.c 1.149.2.9 RELENG_7_2 src/UPDATING 1.507.2.23.2.7 src/sys/conf/newvers.sh 1.72.2.11.2.8 src/sys/fs/devfs/devfs_vnops.c 1.149.2.8.2.2 RELENG_7_1 src/UPDATING 1.507.2.13.2.11 src/sys/conf/newvers.sh 1.72.2.9.2.12 src/sys/fs/devfs/devfs_vnops.c 1.149.2.4.2.2 - ------------------------------------------------------------------------- Subversion: Branch/path Revision - ------------------------------------------------------------------------- stable/6/ r197715 releng/6.4/ r197715 releng/6.3/ r197715 stable/7/ r192301 releng/7.2/ r197715 releng/7.1/ r197715 - ------------------------------------------------------------------------- VII. References The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-SA-09:14.devfs.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iD8DBQFKxltlFdaIBMps37IRAp4zAJwJEwIySGqxH4EXwc0wjkDXlcTb1wCfTltO Syds53GSM0YbsMNUVMGsLaU= =exPZ -----END PGP SIGNATURE----- From owner-freebsd-announce@FreeBSD.ORG Fri Oct 2 20:12:55 2009 Return-Path: Delivered-To: freebsd-announce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CA400106606F; Fri, 2 Oct 2009 20:12:55 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id B5AD48FC13; Fri, 2 Oct 2009 20:12:55 +0000 (UTC) Received: from freefall.freebsd.org (simon@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n92KCtex004040; Fri, 2 Oct 2009 20:12:55 GMT (envelope-from security-advisories@freebsd.org) Received: (from simon@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n92KCtLI004038; Fri, 2 Oct 2009 20:12:55 GMT (envelope-from security-advisories@freebsd.org) Date: Fri, 2 Oct 2009 20:12:55 GMT Message-Id: <200910022012.n92KCtLI004038@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: simon set sender to security-advisories@freebsd.org using -f From: FreeBSD Errata Notices To: FreeBSD Errata Notices Precedence: bulk Cc: Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-09:05.null X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.5 Reply-To: freebsd-stable@freebsd.org List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2009 20:12:55 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-EN-09:05.null Errata Notice The FreeBSD Project Topic: No zero mapping feature Category: core Module: kern Announced: 2009-10-02 Credits: John Baldwin, Konstantin Belousov, Alan Cox, and Bjoern Zeeb Affects: All supported versions of FreeBSD. Corrected: 2009-10-02 18:09:56 UTC (RELENG_8, 8.0-RC2) 2009-10-02 18:09:56 UTC (RELENG_7, 7.2-STABLE) 2009-10-02 18:09:56 UTC (RELENG_7_2, 7.2-RELEASE-p4) 2009-10-02 18:09:56 UTC (RELENG_7_1, 7.1-RELEASE-p8) 2009-10-02 18:09:56 UTC (RELENG_6, 6.4-STABLE) 2009-10-02 18:09:56 UTC (RELENG_6_4, 6.4-RELEASE-p7) 2009-10-02 18:09:56 UTC (RELENG_6_3, 6.3-RELEASE-p13) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background In the C programming language, address 0 (NULL) is used to represent unallocated memory. NULL pointer dereferences are a common class of C programming bug in which pointers are not properly checked for NULL before being used. Dereferencing a NULL pointer normally terminates execution, via a segmentation fault for user processes, or a page fault panic in the kernel. II. Problem Description On most architectures, the FreeBSD kernel splits the process virtual memory address space into two portions: user and kernel. This improves system call performance by avoiding a full address space switch when a process enters the kernel, and improves performance for kernel access to user memory. However, in this design, address 0 is part of the user-controlled portion of the virtual address space. If the kernel dereferences a NULL pointer due to a kernel bug, a malicious process that has mapped code or data at address 0 may be able to manipulate kernel behavior. For example, if a malicious user process maps code at address 0 and then triggers a kernel bug in which a NULL function pointer is invoked, the kernel may execute that code with kernel privilege rather than panicking. III. Impact This errata patch introduces a mitigation feature in which user mapping at address 0 is disallowed, limiting the attacker's ability to convert a kernel NULL pointer dereference into a privilege escalation attack. The feature is disabled by default in FreeBSD 7 and lower, and must be enabled by setting the sysctl(8) variable security.bsd.map_at_zero to 0. In FreeBSD 8 and later feature is enabled by default. While extremely rare, certain applications may rely on mapping memory at address 0. Careful testing is advised when enabling this feature when using virtual machines, emulation technologies, and older a.out format binaries. Changing the mentioned sysctl(8) variable only affects processes started after the sysctl(8) variable was set. Processes started before the sysctl(8) variable was changed will continue to run with the setting of the sysctl(8) variable which existed when the processes was started. Consequently, to ensure that the sysctl(8) variable affects all processes, a reboot is required with the sysctl(8) variable configured as mentioned below. IV. Workaround No workaround is available. V. Solution Perform one of the following: 1) Upgrade your system to 6-STABLE, 7-STABLE, or 8-RC, or to the RELENG_7_2, RELENG_7_1, RELENG_6_4, or RELENG_6_3 security branch dated after the correction date. Enable feature as mentioned below. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 6.3, 6.4, 7.1, and 7.2 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 7.x] # fetch http://security.FreeBSD.org/patches/EN-09:05/null.patch # fetch http://security.FreeBSD.org/patches/EN-09:05/null.patch.asc [FreeBSD 6.x] # fetch http://security.FreeBSD.org/patches/EN-09:05/null6.patch # fetch http://security.FreeBSD.org/patches/EN-09:05/null6.patch.asc NOTE WELL: The patch for FreeBSD 7.x can be used on FreeBSD 8, but does not enable the feature by default! b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. To actually enable the feature in FreeBSD 6.x and 7.x, add the following to either /boot/loader.conf or /etc/sysctl.conf: security.bsd.map_at_zero="0" VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. CVS: Branch Revision Path - ------------------------------------------------------------------------- RELENG_6 src/sys/kern/kern_exec.c 1.275.2.9 RELENG_6_4 src/UPDATING 1.416.2.40.2.11 src/sys/conf/newvers.sh 1.69.2.18.2.13 src/sys/kern/kern_exec.c 1.275.2.8.4.2 RELENG_6_3 src/UPDATING 1.416.2.37.2.18 src/sys/conf/newvers.sh 1.69.2.15.2.17 src/sys/kern/kern_exec.c 1.275.2.8.2.1 RELENG_7 src/sys/kern/kern_exec.c 1.308.2.11 RELENG_7_2 src/UPDATING 1.507.2.23.2.7 src/sys/conf/newvers.sh 1.72.2.11.2.8 src/sys/kern/kern_exec.c 1.308.2.8.2.2 RELENG_7_1 src/UPDATING 1.507.2.13.2.11 src/sys/conf/newvers.sh 1.72.2.9.2.12 src/sys/kern/kern_exec.c 1.308.2.6.2.2 RELENG_8 src/sys/kern/kern_exec.c 1.337.2.3 src/sys/kern/init_main.c 1.303.2.2 - ------------------------------------------------------------------------- Subversion: Branch/path Revision - ------------------------------------------------------------------------- stable/6/ r197715 releng/6.4/ r197715 releng/6.3/ r197715 stable/7/ r197715 releng/7.2/ r197715 releng/7.1/ r197715 stable/8/ r197714 - ------------------------------------------------------------------------- VII. References The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-EN-09:05.null.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iD8DBQFKxltpFdaIBMps37IRAoniAJ9ENWQ431doaje7gXrAfAov5l0FKwCdFRxh rTmlD1oew/hZTMBuFKM/LSI= =+ZZf -----END PGP SIGNATURE-----