From owner-freebsd-announce@freebsd.org Wed Sep 2 17:45:25 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 327883DE7D8 for ; Wed, 2 Sep 2020 17:45:25 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWYd0Tvgz3b7m; Wed, 2 Sep 2020 17:45:25 +0000 (UTC) (envelope-from security-advisories@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068725; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=qj4l4/PaJlfzmbYbkvEYkqbfaQqYHXp9PKCITPLMh3I=; b=Jyi9LdokfxPOdX3+PfC9EcUOUP01Lbgh/iF0TPTdnVKNhDfFaNdhEnaaosxvnMdFe7kecY uIvgQskxjgqjT+Mh2uroP8zG0nFlS+jjtqmRGAoTdPvxeCOj1C2DYOVnkM7jFsMO/SkoNy q1a0dTvdHwkEfcODiJrsBTs0DV/qL/e7IyjlVJJdOE0zMGFqvmjnPudlFAc0M1tVD2PVWK oRBKd9oJDNH4l/7I8ctvubcHpAY2Dik6+6Bzv4ftWsYLMNoLLk1Nx69wRD8tiHdhBaQ4dX j/zAOB+4M4pwUbPP2lka1JkBWfyJkRarlDeuxqZWBmDdxMn39kmW/lkjOtwIoA== Received: by freefall.freebsd.org (Postfix, from userid 945) id F3AEEC921; Wed, 2 Sep 2020 17:45:24 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20200902174524.F3AEEC921@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:45:24 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068725; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=qj4l4/PaJlfzmbYbkvEYkqbfaQqYHXp9PKCITPLMh3I=; b=QlQ2WWgeJcjg9JxbVA6WGEkrjv16XpgNeCA7lHTECUziqb9/Gbwx0yeObdQ7Pz2ill3Fv6 KQxeVPPFO05/k+L4bSNXXuVp52jMOVFDjd7djuMOMoQ+xoWF6tT5VGc8ePCR1MFElHLva+ iipVoL+VJbwDnGRwF8DN3q05b+d2wCm+DC2ZoLAA5IRWYtlos6Klllo+NwR3jnxHMlQyMa r6U51jhuoqNXpL/WQRVVUYa7ib2alhBlLV0Jll7f33oa5qhuljfgF/62IGi5hLlM/lzEYm pCP0ixBdq7RS5SDCrnn9Tnlrbod0iGMTONtaTU9LznademNdHd1Keu15IJq1kA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068725; a=rsa-sha256; cv=none; b=aF87K5VwQlsKJHF1W5Vm1SfeJ3P/nXc63K8+3Kd0XH4F6xes7f9LoIG0VyhJXuj+XkkiQW Y0/RpkXuGJ2u+V0p64VB/TWPq9Zfc3nrq7NOFZV2XVWi3mUK7h9ccnDLfdX3PjqqPT500u TWsTctaxoDKHioa8lQX5GLGj+Kl6M43RX45IP6RWRbWhZ+1YbxLZAWvsHF7NjxdUxNBDp4 60a+bQ7uoSc/Gp9C6KhPf4JLsx1IdwBdaq1RQ5TJRkBGRHe2+1P6kz8sGaxwi/Div7BJuV brn6T7xFEuXi5zb8f5DvlYnl6sriTxgw6pVRuYYqDZ3v1P8NWG12fuHf4KUb8Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-20:17.linuxthread X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:45:25 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-20:17.linuxthread Errata Notice The FreeBSD Project Topic: FreeBSD Linux ABI kernel panic Category: core Module: kernel Announced: 2020-09-02 Credits: Martin Filla Henrique L. Amorim, Independent Security Researcher Rodrigo Rubira Branco (BSDaemon), Amazon Web Services Affects: All supported versions of FreeBSD. Corrected: 2020-06-25 05:24:35 UTC (stable/12, 12.1-STABLE) 2020-09-02 16:21:27 UTC (releng/12.1, 12.1-RELEASE-p9) 2020-06-25 05:35:46 UTC (stable/11, 11.4-STABLE) 2020-09-02 16:21:27 UTC (releng/11.4, 11.4-RELEASE-p3) 2020-09-02 16:21:27 UTC (releng/11.3, 11.3-RELEASE-p13) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The Linux ABI layer (Linuxulator) allows Linux binaries to be executed on a FreeBSD kernel. II. Problem Description The kernel function handling exec(3) of a Linux binary did not correctly handle a calling process with multiple threads. III. Impact A multithread non-Linux process execing a Linux binary would fail a kernel assertion, resuting in a kernel panic "thread_detach: emuldata not found." IV. Workaround No workaround is available. Systems not using the Linux ABI layer are not affected. V. Solution Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot. Perform one of the following: 1) To update your system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +10min "Rebooting for an errata update" 2) To update your system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-20:17/linuxthread.patch # fetch https://security.FreeBSD.org/patches/EN-20:17/linuxthread.patch.asc # gpg --verify linuxthread.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/12/ r362605 releng/12.1/ r365253 stable/11/ r362606 releng/11.4/ r365253 releng/11.3/ r365253 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9PzRZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cIZEw//QwJJ3DX0k1PnOwRDdl5KSORAZq1Qfa0Rdo4N3QK31Ap/GiAmW+6wZRr1 Cb3dAywlfjw8F+Hnxc6za1V0W7Ckr/tbJHGt1XXsq8Pjpc6+GdNGRZi7eiAQHvU7 I9xkL1jnerBY0l5hq8A6ti1vhraNEFvA0/0lluhqCpgFPEtc/vbvKemyC0RAKVzF wAz7P3/OyQqcd5qVHBIYfOziau/lfQ2/qD+6hLSZ5pgGX4e/tB1NrYVSd0vNevOl d3P9LDQYxSIzQ5jHbfLSFOPkT471ItJ6+QW+pAIZQ0Sv4hTQPBRHOL4ZfXG/IDgr +mVBa6L8lykeC+xh9Teih+dKqZRY5SzKuZVUqURCY2P6miq8C5A2eiTtGIIuwgFF okqTJx0a+ECAEc7dmaEAM8snqKiPYgu1cCOXKrvAPpkB/Ss1w0Zr/YxLW6v3lMmO nFOUGeXF9hLxDIINdKRNdaum8aqy1Vtg6xKNfP6z/H4V6saLSLrWk0M2HDKNOyts MHc/P7zg7hMw1ft/VhiOEWgCk7Se3Q1D2IY53BsUNgtbs5ti29mEeOkNO09FkPYL t9f3uIOZD9PLg1kDIDA97DulL95gXyX2K10wHciOnDgU+UitHCOqXAnkYGKbezfS ID1JRdq4uHHIjPOTOiUkTYJDnR/Lgz2572KkTjM5d7YOviS8nS0= =1pOR -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Sep 2 17:45:33 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B35253DE653 for ; Wed, 2 Sep 2020 17:45:33 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWYn0DTkz3ZmY; Wed, 2 Sep 2020 17:45:32 +0000 (UTC) (envelope-from security-advisories@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068733; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=xJYfhXvmpM06HJVnuGgD5MebvnvttxHRfSFXMwULc1A=; b=NpJ4Nv/sa4ZNfOBJcjw5fVaadwLe/hxMitow8REn6t0XvbAE0x4rnN2A2P+NTaclBrV77C uZxHCqMrxsxHTxJE219fjcypQP0aZ0psIu9ZI0QL0d43c7QbVRyEo+sJEX5yGjE0VmL5Vo 0Iv/FtVxht6t+w4MXfvHLwkD2IxRJ1Otvy1HTy+JylB9d+I97iQr5Wjmxkd3jJuAe+YUZH p5jDj3eW3HhOoxBx7hHdM/ogCtlEpqAMUacYTncwL6dbGJHldSW/b2t+MuK3aa1PuzjXpt JuzlWUSNy7K+66aszeJgOg2IJ3KuT1BguNK1vrMmT9hh4bx0oe+RH4VUk9aLog== Received: by freefall.freebsd.org (Postfix, from userid 945) id 27A50C7C4; Wed, 2 Sep 2020 17:45:32 +0000 (UTC) From: FreeBSD Errata Notices To: FreeBSD Errata Notices Reply-To: freebsd-stable@freebsd.org Precedence: bulk Message-Id: <20200902174532.27A50C7C4@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:45:32 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068733; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=xJYfhXvmpM06HJVnuGgD5MebvnvttxHRfSFXMwULc1A=; b=JzkWbWE+xdzpFQH+WLJRhCQAcKtR0gPXWCkH3tSl7PbV3sVRZmnoWtAivjjUnuS1bFHRcK rPrOlw+MWsvXYU0zp3SelpCiJlZHJnr+6hxI5oI6MYKUD84R5AYOvMaB7OWyhIvWvhT2OO SbyrZSWkraimOQUCHTj/6DP8jj1d8Vff6fXcbUg2A4RENvEMBYl26k69Jj+GP3XYQhejgt fe5ldEJDZpWu58Kz6oAJ5rNNcyptPrHLmULQOtEI2Urgfe1+e4W0yReFkamaJjzKQK/Wcw o9eP51t8S6VkMPncjrg9vp4RPsrJVAtums4rPBVDMQg+RKCc/Nc0WUtxd9dSlQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068733; a=rsa-sha256; cv=none; b=Rr9bnwob8M/nNYb69SWIVucg1nHUoTdxBN4GeQ9goknhJcVxAwf2H6n4rzPdvDvtCSNq9G N67CnvGyszCkHnvG6i6243bAeCkXl4JyJQxwZtrbkD9353A7Zhb9xfOq32lrMul6vJHITC G/7FxA9Yz5OCbQIRE+e+cDDCfDVG+eX4oW0yW+bEsMcSaClpZbbSJYCbvCV5WtYykhFK4y FT1zvXVy8Na8TMEsXi4CD/QI4ldD44gYNLgn6lAqO1sL//rvtMiQuZOpZJjedUAerLjnD8 tEv6wg5QS1H+71qIBqmxLbfPXDjOdqkTrcuVOc7Kzx86zQ/Q5p+bw08kYKkNQg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-20:18.getfsstat X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:45:33 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-EN-20:18.getfsstat Errata Notice The FreeBSD Project Topic: getfsstat compatibility system call panic Category: core Module: getfsstat Announced: 2020-09-02 Credits: Rodrigo Rubira Branco (BSDaemon), Amazon Web Services Affects: FreeBSD 11.3 and 11.4 Corrected: 2020-06-20 04:39:52 UTC (stable/11, 11.4-STABLE) 2020-09-02 16:22:14 UTC (releng/11.4, 11.4-RELEASE-p3) 2020-09-02 16:22:14 UTC (releng/11.3, 11.3-RELEASE-p13) For general information regarding FreeBSD Errata Notices and Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background getfsstat(2) is a system call which provides information about mounted filesystems. The kernel provides compatibility system calls for old versions of the interface. II. Problem Description A bug in an internal interface used by getfsstat(2) compatibility system calls could result in a free of an uninitialized pointer when getfsstat(2) is called with an invalid argument. III. Impact A kernel panic can be triggered by an unprivileged user process. IV. Workaround No workaround is available. V. Solution Upgrade your system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot. Perform one of the following: 1) To update your system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +10min "Rebooting for an errata update" 2) To update your system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/EN-20:18/getfsstat.patch # fetch https://security.FreeBSD.org/patches/EN-20:18/getfsstat.patch.asc # gpg --verify getfsstat.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/11/ r362426 releng/11.4/ r365254 releng/11.3/ r365254 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9PzSVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cJrrw/9E3bKTN36F+FPrGdi6wWeAHUEZt3hoonrFqrn4SPUEVSRkk39HGpitgJ8 KU7HDr9U9B6zaIYnqE+1BWiIYYhqQQM5zb77TGr0fy/LVa8a+m/6o9wzib26lsAT jrBS0hsZ0Swb8TlrQdaEpLp1wkEdhy5t10hJ/+/nezzo+q2C52m4Bs80J7gE9BCq uxgCRlnld3fXJrKrOva8WfvMziE8nV9CzKF9luYlP7U9s1PS5H5U6r22Y8tvzZqS IbH60i7vPhlqX8faxZfKGRIABsJhnee98JF0rDRBOmMwTnFBTmaot75eEjwZIc5p 0GtM27NOM6a/AaO9Yr8U4PI0PffTi8hVm/1t6dlhG5X3O7IUxKC0XT1vlh3jJ1j2 9i1iuuGU3zSzTSMyWMmzuxCz/YK0C/g4C86ehkdxOYtn6RV31rMSoKdPjxSbyhIJ ef1eXHm6iBM8aofto24WjCSftPno0rx1peeOnKAqvpTpGH+n08H6iRFagaOt6kkQ qhy+ZtrlzmjUeUqwLSnyuHJtK+QkP1WFTnT9QgMPnqpRB9e+OsQC2K1KgR9lkOG0 2kyTu+fJGkNvhiHxKuvIsh5OiNvNm/QHYwESaGPbFhierh+CHs00M00GyeeCjBSr nMbA3DsD3OxrrxYqh/17x4XoiopY6gUSlDSG+RbsTFsTqTxi308= =E4P4 -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Sep 2 17:45:53 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6B8973DE678 for ; Wed, 2 Sep 2020 17:45:53 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWZ920pNz3bBs; Wed, 2 Sep 2020 17:45:53 +0000 (UTC) (envelope-from security-advisories@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068753; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=XfaQ8J8+wfq5usNpWFUz4NucE+j6kJxpfLuRDFHBB+k=; b=hdIZ96o9gqK5fAwyYWDEoObIsv0xgQI8Er7MLys39M+fKQMKcVf21pD+aGXciZRQ+1/qJK Rv6SX64y7oavjsYcRRuAklB/Yp4sejPsdwbidvuRpBH9SCUsHB9YOx4Hf4F1Cbjxc8MQt4 YToSYej+7V4DvTQp9oQojKscTsZxVd4qfw1BigW9SSRHe1pryzmP2/JqBc2APoJWd61wZG mbtlrhneqTrUOsf4J8OpfMX+1ayiPa3Nto/yYk8LGdGLIgTkzginkjc1HjOQGH9yrAn93r ccCW2S1LdyDJ11J8OaWX+88fDZVJi6jJODhB5+2gQoQVkZIFFSoNRN86WcHVnw== Received: by freefall.freebsd.org (Postfix, from userid 945) id 3B04BC848; Wed, 2 Sep 2020 17:45:53 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20200902174553.3B04BC848@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:45:53 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068753; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=XfaQ8J8+wfq5usNpWFUz4NucE+j6kJxpfLuRDFHBB+k=; b=J3QffFK05l9FOHt4uNMKIVvPBvBTVkDYRGgxde7mccDjZT2wweXKrj8/sdUGUPB85CcLF8 iUFiXPR+onug1s16WZ0IxN5hXihGSokXC+sWwLnXHyr8uRX63GxOeRxJ9ZG9p7D4OSCUo3 RYK2uR2pQf5jebj0VpbKfFFG/lM/2p2UqSNpB9v7K1aHyQB8d3uNvjewDADi2lXbtWEsph +Vqif3jnBDnFFXMHI71yq+tPLe+ThlgCUeq9nW7ZP5zVYRkgaVYdujb/Dbo06y/mok23c2 RqKB/bjtc2NedOMXTFNwcPycXoCf70DW0+HkAmy0v5TEB4lPnML4sKG/M/e1QA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068753; a=rsa-sha256; cv=none; b=BUOeh9ARIq8lmGfiqgNRkL2aNzpUhIjr6C/3WfaI57zTdTJafwNldJI35dgZUp7S1Qk1dQ 0llQsHYBQ6B2PrxSglJ3NmXQeJm5RZwDb1JY+PDsNCVifmop6gDtvSxudblMLmiueYHsRR Fk7MEcV5NuqZCnnHH5PwcAYJ0qGCaSSkwZS6/xIJiT13cmGz8Jo+EpSGKl/X7yJLk//d+a abm9tk3RO2rI3/NjJOHET0goVnyjumBJrUbYUQGL5QnGmmrm9KYerG036/mc87v2/04X6S HyaKahga9ZuokX31yNr+FkVRkBUuwgFSHO3i7o6M46ovD/YlkQIJDcCszHrJQQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:24.ipv6 X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:45:53 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-20:24.ipv6 Security Advisory The FreeBSD Project Topic: IPv6 Hop-by-Hop options use-after-free bug Category: core Module: kernel Announced: 2020-09-02 Affects: FreeBSD 11.3 Corrected: 2020-05-07 01:28:59 UTC (stable/11, 11.4-PRERELEASE) 2020-09-02 16:23:15 UTC (releng/11.3, 11.3-RELEASE-p13) CVE Name: CVE-2020-7462 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background IPv6 is a network layer supporting Hop-by-Hop options, which can be sent by applications via the socket API. The memory management for packet handling is done using mbufs. II. Problem Description Due to improper mbuf handling in the kernel, a use-after-free bug might be triggered by sending IPv6 Hop-by-Hop options over the loopback interface. III. Impact Triggering the use-after-free situation may result in unintended kernel behaviour including a kernel panic. IV. Workaround No workaround is available. V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot. Perform one of the following: 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +10min "Rebooting for a security update" 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-20:24/ipv6.patch # fetch https://security.FreeBSD.org/patches/SA-20:24/ipv6.patch.asc # gpg --verify ipv6.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/11/ r360733 releng/11.3/ r365255 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9PzTNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cLJYxAAotGAWrawa3gRK8gVpEIJiYknR9bODjDojm7KovlkuKeYAkyQ92/Ii23U U6tMXSPDYQFyscOdrGq4yEjxRDLLkGQGynQpioinDn8POKX7BKpy+PFFdv1mmBef h/WpgmlPdhymYisaImgVyGAxU81auzpFB6mArzFDCdHavTd7jVD2lJwcpdzeOk// NHOsj8C4VYJs0XcYrNa4CEWfH/D/uNO8u2b3QUfKQSOdfIfaDv22k2b96YKm+zcr xS7Q1jDv7QBTQou7KNOfoPi0Gclp8Q9VReP2nY/hB5TmJjR3irz+Z6UcGfiyDGrL XRB7oP23jIUmBbsINUN06FIhAPGF9/7zcOOoV1YOdwvmbLM0/W4c+mERZ16gw6+N MzCLDOeiyKAUr+pQzcl6lORxr31eB8400l6nRJwmCiWx4nHwyHPIl1RtfvsdNqfE /OBVEalxsCrzStfW4ME5RziPo9Y8DrajPf7+JY/4CIV3v/dJAiGi3+qs9Zn8enar WCR/8+o4xbT+d1sGTG1W3Qjh9a28jxqEusLjdehDy8PTk9OnIfPRuxj+kvot3Wo0 lWdeSIo8YZPYn7hG9N19k6aDlljM1fgkBmWj1uELtCeIE7WM5tHGMBuaS0cTt1jL s2g01qgkgW2a6cChdm3oNfUKE5KpD3/hU63/jEA6QyJJQQqXlOs= =kFlz -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Sep 2 17:45:58 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 960FC3DE6E3 for ; Wed, 2 Sep 2020 17:45:58 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWZG2WZLz3bCG; Wed, 2 Sep 2020 17:45:58 +0000 (UTC) (envelope-from security-advisories@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068758; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=B+JyZ1omRR/4OG3IUGrw8uGoMffGrzMCvg1PmGCd5Oo=; b=UDko1iYESpRGb0woFjs8JdfrN6+0pRTEMKbf2XunjUsqOY+NImb60eqAFMrfHaFW7oP2bi +/g6A44/H6fPJwtnoDVpgbfD9CM1wLdvbbcLYRd5wWPt9CZdeM/nhPPe4diNUqkT5fRSh+ wsxEaaCWmjl+6Jw4fasntxYK4zXBuoYiUZn6m48FcomYf1kUQXrbpvsY27e4x9UTGc8Ng+ D9r7iTsGHxutNuWRsh8fZ+H/MYVuip21mO19xC6AyDyDWHTxbq4SKmRAE5alwdaZ96QGx9 qYCR2JBUFUnVO3O8CIMPdPbYOXbiBeVDSvrXJ88Bj7ZMmhi0UzBmHdOeNi+PdQ== Received: by freefall.freebsd.org (Postfix, from userid 945) id 35009C84B; Wed, 2 Sep 2020 17:45:58 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20200902174558.35009C84B@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:45:58 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068758; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=B+JyZ1omRR/4OG3IUGrw8uGoMffGrzMCvg1PmGCd5Oo=; b=A9hfHUrxPlpzaT+mMHh4SpBwGl/Wwl6wgIiRTRGc31ruFghxVMK3sPJnQKq+i00RgEvFxb YxTl6SS4KBq6iXRq+/hoCJRlUWAmO/THrP0fD52Q9qYSv9UGK3vEVDAiajjxTHtpKgL6NH a7NClYc5rtytCccyxU7Rv/b+AE7+ZZ6A+4oDqVnc5JjrwPOlwEYDQPy0ru55UnkUjjXNOF WxrPOCz9CVaPsJQ0YyT749KrE8IcOgHbRcDd03P3j0RCUiwqvF+uWkpeStUOUb9Ffp0Xd/ aqC2iuL+fhIFEdu135cQmtvkCMEyA5FUqf8lnMLXTlRbZ9ttGbY4mGCoC915nA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068758; a=rsa-sha256; cv=none; b=yCVXkatzoupTOmygfSiJgDG9qC8MGt91PcNa2oMX70v8U2/5Cvrzj1rTGpS69FLJNdmkdf UnytmN0gVCjh0s92gyHudQZVKGPChVpJaPqiteFfJFNzrhorEgceJC/XEozLOFYkZJFmWY NhyB9MCNJtYmG4nwB5FAtu9aM7ZW0MF+24vLe/Ks5x78Q/WtFjbMadV6WX9ZL/ZFOimFbm uKMarQPMG/p5KFMt9fyUoOZZk2sko1F2tBBIzFIDCes4jy0HT0OigpGFnlQJinMSy1UktX cAQSPWlEtZnuAZ+d1cl9wrB0fNJvmnvARpK+dbi1DNl2tQFWzaF8QccTdabqWA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:25.sctp X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:45:58 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-20:25.sctp Security Advisory The FreeBSD Project Topic: SCTP socket use-after-free bug Category: core Module: kernel Announced: 2020-09-02 Credits: Megan2013678@protonmail.com Affects: All supported versions of FreeBSD. Corrected: 2020-08-24 09:19:05 UTC (stable/12, 12.1-STABLE) 2020-09-02 16:24:32 UTC (releng/12.1, 12.1-RELEASE-p9) 2020-08-24 09:46:36 UTC (stable/11, 11.4-STABLE) 2020-09-02 16:24:32 UTC (releng/11.4, 11.4-RELEASE-p3) 2020-09-02 16:24:32 UTC (releng/11.3, 11.3-RELEASE-p13) CVE Name: CVE-2020-7463 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The Stream Control Transmission Protocol (SCTP) is a message oriented transport protocol supporting arbitrary large user messages. It can be accessed from applications by using the the socket API. II. Problem Description Due to improper handling in the kernel, a use-after-free bug can be triggered by sending large user messages from multiple threads on the same socket. III. Impact Triggering the use-after-free situation may result in unintended kernel behaviour including a kernel panic. IV. Workaround No workaround is available. V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot. Perform one of the following: 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +10min "Rebooting for a security update" 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 12.1] # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.12.1.patch # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.12.1.patch.asc # gpg --verify sctp.12.1.patch.asc [FreeBSD 11.4] # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.11.4.patch # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.11.4.patch.asc # gpg --verify sctp.11.4.patch.asc [FreeBSD 11.3] # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.11.3.patch # fetch https://security.FreeBSD.org/patches/SA-20:25/sctp.11.3.patch.asc # gpg --verify sctp.11.3.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/12/ r364644 releng/12.1/ r365256 stable/11/ r364651 releng/11.4/ r365256 releng/11.3/ r365256 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9PzTZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cIMPw//ZOYh7TQdwvreQ/iZbJphPp7hBVJqFWPE9M72Yfo87/vkl+T5/GW9wiLT MQlknQ7SDyzE7i8RpGvX0lmXLbr1e2rkvin1ZFdCbWkPzC7w0WVH7XX6+I+RJmkh E4dtmHrYhLRwmVtW5WYZdfO+iYVTJl/h43eYbYvNgJZSuKkvl2Vk6DqyseHx7xR6 gc7/41AIpMiqRLQI9ZnRvZCEiLq4G+q5z499ACfAutT9o+1T9L6QLCPuyY+fziiq cI2E/pQA5uxOY/z3ejKHeOzErjycY6GEhMiBKmsJqV6oU/cZd5hZ1qsmE9Xbi3/c Ax+OZr+Ve2a78dD7jOrmCrpBtG1Pg39c6VuQqHD3UN3seBNEkn4kto9vDX9fLceD GZbueV97boFxjnXu1B6C8ufqEZDqTaf/SU3+vCobBgydP+V8c1P5LbP6qcFHOUrk k7ijiJv03aYyY1Z6XtqbRsudZzIaTt+jneUA1eA46iWQqVZQHKo2liw5kAtsGu0k injGcazWRphV6xgOHIMCfrGcLLf0j+4UjiDUk30cansLGewuk/uEh6FlA4NzyRWA 4L3Q0l/XQWvO2sNMtF9LbBUUujDyy93Vy8BouSp59v7+bAYrRHfcIAmaQnE4jev2 BY7/JsrfQ9rG/Anzg49Hec8pw9VEvv4kA1STqXcpMt9Fq+0DslA= =2ET6 -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Sep 2 17:46:04 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9AFE13DE934 for ; Wed, 2 Sep 2020 17:46:04 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWZM4vJ3z3bR1; Wed, 2 Sep 2020 17:46:03 +0000 (UTC) (envelope-from security-advisories@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068764; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=hiRsugYPJy1sq0ut/ZvHuE7PwGuNJXYoiAnGaL8jmkQ=; b=b7INrZ5VEbzkCbfs5E5q19OVvcJWPnBGviJzoT+N5/6aL6inbmovpTAmf13hvNPoCSPFbD ylW4ceBarBg2gHZQXOOrLgxnHvQKT3KF91ir9MxbXY3hvcRP9V4oM+vEEEJEUtuhFkZz+t H+R4evyvL74zPo6I4pBGKfYTjpoZBI8QKSJ/WZdcbHChDaRQFVjhSz+6JjOkdxJhLThF67 NE6xJcomQdgXWodsitOIIkMVDrGwCk6YDPbgtg55rDbu/W1Iw3xqkSZpdEmpksJT/1+LG/ 7Kn3/e6pE3kGbgXZd5QVX+mJ1FU5BhN3JMVGXe3r+Dg4i1IqWphEhRc1EaDNaQ== Received: by freefall.freebsd.org (Postfix, from userid 945) id 94027CA94; Wed, 2 Sep 2020 17:46:03 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20200902174603.94027CA94@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:46:03 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068764; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=hiRsugYPJy1sq0ut/ZvHuE7PwGuNJXYoiAnGaL8jmkQ=; b=VVdtpqg10blJr9TN4jIFfAu94vRyMj70VsgG7kyfdoflph82kG8uNJ9z3UWMenKePdc7l+ wcFVLG64dn8yv0d3aFM143ZwsGqueS3cVUpYLGcCzUHC6b7BfTUrf4JIPSTXuAZjrn8q/S fAS5idMx38ALiSW5ehr1oW9T36Oeq5R6NfTOEj8HOVarWu5pWhOdiPV/sbTBbbQMiN3ryF RevfrFLgLSotlwc7fWupl+4qpkRy6GXuhv/T34SmkHisZOKYV46w8wZtSXBqaLvxFBWqsx v/JLxVAD2i7pUWQqPexF2mnaEWQhsB3a5SRLfiI5mkZbP2Cit3lF2VVqOD3NEg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068764; a=rsa-sha256; cv=none; b=eHGtpUcbIjtaeMtW/5YUpXg8/I5qrYcWBKnis7L5m6GT6oJSMEdDtWSrKkMHmO1sfYhjq/ jSQPpARKqa8XeD2z+cspl0N7auiLoDK/I0ATmRRWH5pSEMGVdaDqHfHgj/Zb2zNSObcUM/ L/GxfxDbE+ngy37755l/WfL3OIcxhivw2tjFLUgUTnMiIEsWUjwhf2V94E28Q9vNUAH2tQ IZuTCbInyBDc4a5USpP2zqa/+DP1hWBioYeapERIX+meFag9GxAEQ8WWiVotgirOtMmlZV AYtB+vcl6s/d/VnCqRvcvoyH0CLekIOpeIudi+w5+U2oUAdu2aqbTC0MDvR1jg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:26.dhclient X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:46:04 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-20:26.dhclient Security Advisory The FreeBSD Project Topic: dhclient heap overflow Category: core Module: dhclient Announced: 2020-09-02 Credits: Shlomi Oberman, JSOF Affects: All supported versions of FreeBSD. Corrected: 2020-08-31 21:28:09 UTC (stable/12, 12.1-STABLE) 2020-09-02 16:25:31 UTC (releng/12.1, 12.1-RELEASE-p9) 2020-08-31 21:28:57 UTC (stable/11, 11.4-STABLE) 2020-09-02 16:25:31 UTC (releng/11.4, 11.4-RELEASE-p3) 2020-09-02 16:25:31 UTC (releng/11.3, 11.3-RELEASE-p13) CVE Name: CVE-2020-7461 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background dhclient(8) is the default IPv4 DHCP client used on FreeBSD. It is responsible for contacting DHCP servers on a network segment, and for initializing and configuring network interfaces and configuring name resolution based on received information. dhclient(8) handles DHCP option 119, the Domain Search Option, which provides a list of domains to search when resolving names using DNS. The option data format uses a compression scheme to avoid transmitting duplicate domain name labels. II. Problem Description When parsing option 119 data, dhclient(8) computes the uncompressed domain list length so that it can allocate an appropriately sized buffer to store the uncompressed list. The code to compute the length failed to handle certain malformed input, resulting in a heap overflow when the uncompressed list is copied into in inadequately sized buffer. III. Impact The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit. However, it is possible the bug could be combined with other vulnerabilities to escape the sandbox. IV. Workaround No workaround is available. To trigger the bug, a system must be running dhclient(8) on the same network as a malicious DHCP server. V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and restart dhclient or reboot. Perform one of the following: 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +10min "Rebooting for a security update" 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-20:26/dhclient.patch # fetch https://security.FreeBSD.org/patches/SA-20:26/dhclient.patch.asc # gpg --verify dhclient.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . Restart the applicable daemons, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/12/ r365010 releng/12.1/ r365257 stable/11/ r365011 releng/11.4/ r365257 releng/11.3/ r365257 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9PzTtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cLLPxAAhg/FSqWLykYAiQ8czoy98X00VIWAP1f4InfUKm8qOB8/7ptzv3A+2Hov 7lHlyN0D4OwhJFt7fw9oTwNe4UgxShso6QrezaTJZR7juFELy9WODbRFnNK4i8w9 NCBab+NIn1o7nFZnB0M5TMKfa4gc1jAV+Q/U/zi+ONvwZegmjXJxuop3Sq8wfBd2 Vp9VAvEJvvBlQKExR2xNRDKV/0LpW+VffIuzlWT2ex3WwGpFVeVSL0ZNJsPbzMYX j0aqGo9B/mHfXtKSQ415kGxiaQctnu5FqjNgSc00byzOU0YTiLsPwPdUgIt+nuQd WFSePoZsDYstkkJ8YaCA/LVzmZo0tNR8m+z7xmhCszUbMIV+iRSycUexEbCXoPx/ Ebg6ycyYMwguK7rL2dkjNWTkr3hP5CgLD7VnzVBYGiBY7ha0zOgbaYWl/33Az5Fb 0eaIyJRFCDmI32NZfri1WLc06K1gFcVcR6VO+BUqRHG6bkYnF/4xlla8ERhYgNeC Y9cs4Y9TNRges79k7jovpu9B5nicTEqMRQBubcARX5+w9zLg8h2aKH6inuVy1srn M9H/mjdCHMkySpSSrENw9Jk5I7RAgHHRgA1OTkB6Da02aMzPEh6fYHWeR7IpvxPc 2A/hxnZy0tTeZ4aKbds1GYZWUVDd3I8DlSVcT5Bq1g5kk6I+PN8= =jfay -----END PGP SIGNATURE----- From owner-freebsd-announce@freebsd.org Wed Sep 2 17:49:05 2020 Return-Path: Delivered-To: freebsd-announce@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DB6B13DF8CA for ; Wed, 2 Sep 2020 17:49:05 +0000 (UTC) (envelope-from security-officer@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BhWds3y3xz3d42 for ; Wed, 2 Sep 2020 17:49:05 +0000 (UTC) (envelope-from security-officer@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068945; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=z4DezwoBzYyDPv2q7Pv3BGCAlWsnFbo0gb8Sju4QfIA=; b=W14JLjZdebztIYP5MPGAbDM7S2wk4R7pJtC0LmEABZdCSIYoKrMts7sEk/gHPYm2pincGK cpudCV8VoUr58+blCbpybbPpPkCsWsX5FDNyLT/9kWHdTY+6PKbrbf+MTPwyPvjvhBdvo1 Q/NUpcMK5N7jn1j7fY0ZwuN/D88/K3ELEikfc38q+Qd3DWx9oGxiMhofXRP9krjCvwNVXB 9mn5rlUjrh5iFCzeqJ7+jOCy1fOGqJWwt7ieChHAQZyXe1O/s7WKcPBD+/TuMUbXeoNzfn vuVum8Xe3aIPopK94eHQHaf7kaP8uhuigU8ufU0qA5QktzEs8FAP8bnrCHVBrQ== Received: by freefall.freebsd.org (Postfix, from userid 945) id 79175CDDC; Wed, 2 Sep 2020 17:49:05 +0000 (UTC) From: FreeBSD Security Officer To: freebsd-announce@freebsd.org Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20200902174905.79175CDDC@freefall.freebsd.org> Date: Wed, 2 Sep 2020 17:49:05 +0000 (UTC) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1599068945; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc; bh=z4DezwoBzYyDPv2q7Pv3BGCAlWsnFbo0gb8Sju4QfIA=; b=KFtPmEl+3irrSS9k+sASDNmxeqpHfbe3YL/1vPVojs+av67nqLAL/YR9rt+UKahvx0havB RRcH+79k2MQW4ReM7pFqmtQ5a91jDw8JHs9CLoorM9WPoOxRDDDCN2mTvLxs8xExv1sk8p zTVGxdM/VUx+2C0TgO5haCh9jUSiupm9ZIDSxKBPWJkc5V0xR5CO1MoUF8nS4RM+vaSNQn X7JIqjePx+GQarWlmkRpkkuX4+V6I0ANBZTE6CN15FY4KlyOfMtKCSQjoAK9t7J2APPkkx RVQzl8aCSDQLP9PMRsNRS9XMHBLpolS0EV6zgifIjcVoqLZcjO5+04lwmgX48w== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1599068945; a=rsa-sha256; cv=none; b=jfc6UFTUj6604rdsRTlVax7S+QfnkF+JgFRClpO4d/lAkw6nKejNPwhHKLbMVz64QwjZT9 2mljjK/1TkDGVUzeZxWRE5v7Ae2ptTF41McooSU0Id24HKjtRWdnzXjfAPWkRP36b9bWOo PAMv6mVCaTz5B5UgDtRUqu/OmVINzS5cKs9im6dztyosICrSIMzZnNv4gMFZ53OBzxwXii Lu6cwaAPsBOrPlUJu278hf7b9rPXQUAo9Q1SyPO0zVMHP6JUDnBWscw+1dX9WXlvC0SLk6 2aXo0s1d6GTbSVsc4YKAmw9CF3ZHZVvxPC3Z8NGV7wOIb7PB5Cn73SBwjVuNmg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Subject: [FreeBSD-Announce] FreeBSD 11.3 end-of-life X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.33 List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Sep 2020 17:49:06 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Dear FreeBSD community, As of September 30, 2020, FreeBSD 11.3 will reach end-of-life and will no longer be supported by the FreeBSD Security Team. Users of FreeBSD 11.3 are strongly encouraged to upgrade to a newer release as soon as possible. The currently supported branches and releases and their expected end-of-life dates are: +--------------------------------------------------------------------------+ | Branch | Release | Release Date | Estimated EoL | +-------------+--------------+-------------------+-------------------------+ | stable/12 | N/A | N/A | June 30, 2024 | +-------------+--------------+-------------------+-------------------------+ | releng/12.1 | 12.1-RELEASE | November 4, 2019 | 12.2-RELEASE + 3 months | +-------------+--------------+-------------------+-------------------------+ | stable/11 | N/A | N/A | September 30, 2021 | +-------------+--------------+-------------------+-------------------------+ | releng/11.4 | 11.4-RELEASE | June 16, 2020 | stable/11 end-of-life | +--------------------------------------------------------------------------+ Please refer to https://security.freebsd.org/ for an up-to-date list of supported releases and the latest security advisories. - -- The FreeBSD Security Team -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl9P2pRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cJ0uQ//XqU8jWQ0ZMA0usGtDm/Ss1kMa8+PPHklJAE4e8robt5EWgnjvJ+mzNCm jIZMAVNz/uGgbUV1CK1r3hwxNNHJ6PhSwHd23NVPj0r1uJzlcFcAJ3p6eAvVMsWj Kge3M8JMKn0+QOdeTR85B1xX8e7YwYO83Q/FW8wJlIo1nmswMHFo42c3eG0buSwM KWas/T1MymlgaGVfS/8HDtswOBn2nxLvuUtvQQKbf2yIjeFtXC4D9fLKc/z4wTFf kYrUFhgtKtJkIzV7l6kVgyKIYjVY0GnuQDdZ4FtQZ1jaXUfhWOLtq+FcsIa/O80r 88xvZj7eZAAPvEPmoIiLJ7iMnw7hGJOiaq25RjnHasrvJdxOSWQ64CUUQfNhHk+z jlFMTxHHqZGcznJyKEEjM5pTus0zacXnOlluTX0PutVFPHkQJQ19pfddywGSd6E6 zLKj3OvAlm/KKqhItOdxseNZnFj17NXBMI6ZR84AMKyVp+es4OzFs7gtJos4YBdD sHpGlW+3q+BCL3twIWi/dB8ZvlVp9hHMqd5Cp5/4q1Erab6MfvROCf49/wDcqsB9 MlJIn8ppV/mFpH04GbwhbutgU0bXOJp9pFhJnLMRiFRll33ALmqrVfI14azkMUjp +syc4BGZreK4eIpVslDHITU7ZaD3qDaVos79uNdWpH79mXe1l3g= =esHp -----END PGP SIGNATURE-----