Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Jan 2016 09:40:53 +0000 (UTC)
From:      Gleb Smirnoff <glebius@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r48011 - in head/share/security: advisories patches/EN-16:01 patches/EN-16:02 patches/EN-16:03 patches/SA-16:01 patches/SA-16:02 patches/SA-16:03 patches/SA-16:04 patches/SA-16:05 patch...
Message-ID:  <201601140940.u0E9erMP028957@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: glebius (src committer)
Date: Thu Jan 14 09:40:53 2016
New Revision: 48011
URL: https://svnweb.freebsd.org/changeset/doc/48011

Log:
  Publish todays advisories.
  
  Approved by:	so

Added:
  head/share/security/advisories/FreeBSD-EN-16:01.filemon.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-EN-16:02.pf.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-EN-16:03.yplib.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:01.sctp.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:02.ntp.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:03.linux.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:04.linux.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:05.tcp.asc   (contents, props changed)
  head/share/security/advisories/FreeBSD-SA-16:06.bsnmpd.asc   (contents, props changed)
  head/share/security/patches/EN-16:01/
  head/share/security/patches/EN-16:01/filemon.patch   (contents, props changed)
  head/share/security/patches/EN-16:01/filemon.patch.asc   (contents, props changed)
  head/share/security/patches/EN-16:02/
  head/share/security/patches/EN-16:02/pf-10.1.patch   (contents, props changed)
  head/share/security/patches/EN-16:02/pf-10.1.patch.asc   (contents, props changed)
  head/share/security/patches/EN-16:02/pf-10.2.patch   (contents, props changed)
  head/share/security/patches/EN-16:02/pf-10.2.patch.asc   (contents, props changed)
  head/share/security/patches/EN-16:02/pf-9.patch   (contents, props changed)
  head/share/security/patches/EN-16:02/pf-9.patch.asc   (contents, props changed)
  head/share/security/patches/EN-16:03/
  head/share/security/patches/EN-16:03/yplib.patch   (contents, props changed)
  head/share/security/patches/EN-16:03/yplib.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:01/
  head/share/security/patches/SA-16:01/sctp.patch   (contents, props changed)
  head/share/security/patches/SA-16:01/sctp.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:02/
  head/share/security/patches/SA-16:02/ntp-10.patch   (contents, props changed)
  head/share/security/patches/SA-16:02/ntp-10.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:02/ntp-9.patch   (contents, props changed)
  head/share/security/patches/SA-16:02/ntp-9.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:03/
  head/share/security/patches/SA-16:03/linux.patch   (contents, props changed)
  head/share/security/patches/SA-16:03/linux.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:04/
  head/share/security/patches/SA-16:04/linux.patch   (contents, props changed)
  head/share/security/patches/SA-16:04/linux.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:05/
  head/share/security/patches/SA-16:05/tcp.patch   (contents, props changed)
  head/share/security/patches/SA-16:05/tcp.patch.asc   (contents, props changed)
  head/share/security/patches/SA-16:06/
  head/share/security/patches/SA-16:06/bsnmpd.patch   (contents, props changed)
  head/share/security/patches/SA-16:06/bsnmpd.patch.asc   (contents, props changed)

Added: head/share/security/advisories/FreeBSD-EN-16:01.filemon.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-EN-16:01.filemon.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,124 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-16:01.filemon                                        Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          filemon and bmake meta-mode stability issues
+
+Category:       core
+Module:         filemon
+Announced:      2016-01-14
+Credits:        Bryan Drewery
+Affects:        FreeBSD 10.2-RELEASE
+Corrected:      2015-09-09 17:15:13 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security branches,
+and the following sections, please visit
+<URL:https://security.freebsd.org/>.
+
+I.   Background
+
+In FreeBSD 10.2, /usr/bin/make is the NetBSD bmake utility.  bmake has
+a feature called meta-mode [1], which can make use of the filemon(4) kernel
+module to perform reliable update builds and provide better build
+dependencies.
+[1]  http://www.crufty.net/sjg/blog/freebsd-meta-mode.htm
+
+II.  Problem Description
+
+Multiple stability and locking problems have been fixed in the filemon(4)
+kernel module.  Without these fixes, using meta-mode and filemon(4) on a
+FreeBSD 10.2 system may result in kernel panics.
+
+III. Impact
+
+For the jails and virtual machines used by the FreeBSD Jenkins Continuous
+Integration builders, it is desirable to use released versions FreeBSD.
+This will allow us to set up builders to test building FreeBSD-CURRENT with
+meta-mode, using a FreeBSD 10.2-RELEASE-p9 build host.
+
+IV.  Workaround
+
+No workaround is available for the filemon stability problems.
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date.
+
+2) To update your present system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+3) To update your present system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/EN-16:01/filemon.patch
+# fetch https://security.FreeBSD.org/patches/EN-16:01/filemon.patch.asc
+# gpg --verify filemon.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html>; and reboot the
+system.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/10                                                         r287598
+releng/10.2                                                       r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+The latest revision of this Errata Notice is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-16:01.filemon.asc>;
+-----BEGIN PGP SIGNATURE-----
+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+=INcx
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-EN-16:02.pf.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-EN-16:02.pf.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,149 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-16:02.pf                                             Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          Invalid TCP checksums with pf(4)
+
+Category:       core
+Module:         pf
+Announced:      2016-01-14
+Credits:        Kristof Provost <kp@FreeBSD.org>
+Affects:        All supported versions of FreeBSD.
+Corrected:      2015-11-11 12:36:42 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2015-12-25 15:12:54 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security
+branches, and the following sections, please visit
+<URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+The pf(4) is one of several packet filters available in FreeBSD, originally
+written for OpenBSD.  In addition to filtering packets, it also has packet
+normalization capabilities.
+
+II.  Problem Description
+
+When running with certain network interfaces, capable for hardware transmit
+checksum offloading, or TCP segmentation offload, pf(4) produces packets with
+invalid TCP checksums.
+
+III. Impact
+
+The TCP packets with invalid checksums are rejected by the remote host,
+leading to large performance impacts or inability to successfully run
+a TCP connection.
+
+IV.  Workaround
+
+Disable transmit checksum offloading and TSO support on the affected
+network interface:
+
+# ifconfig ue0 -txcsum -tso
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date.
+
+Reboot the system or unload and reload the pf.ko kernel module.
+
+2) To update your system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+Reboot the system or unload and reload the pf.ko kernel module.
+
+3) To update your system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+[FreeBSD 10.2]
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-10.2.patch
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-10.2.patch.asc
+# gpg --verify pf-10.2.patch.asc
+
+[FreeBSD 10.1]
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-10.1.patch
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-10.1.patch.asc
+# gpg --verify pf-10.1.patch.asc
+
+[FreeBSD 9.3]
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-9.3.patch
+# fetch https://security.FreeBSD.org/patches/EN-16:02/pf-9.3.patch.asc
+# gpg --verify pf-9.3.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html>; and reboot the
+system or unload and reload the pf.ko kernel module.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/9/                                                         r292732
+releng/9.3/                                                       r293896
+stable/10/                                                        r290669
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=154428>;
+<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193579>;
+<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=198868>;
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-16:02.pf.asc>;
+-----BEGIN PGP SIGNATURE-----
+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+=Aw1R
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-EN-16:03.yplib.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-EN-16:03.yplib.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,139 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-EN-16:03.ypclnt                                         Errata Notice
+                                                          The FreeBSD Project
+
+Topic:          YP/NIS client library critical bug
+
+Category:       core
+Module:         ypclnt
+Announced:      2016-01-14
+Credits:        Ravi Pokala,
+                Lakshmi Narasimhan Sundararajan,
+                Fred Lewis,
+                Pushkar Kothavade
+Affects:        All supported versions of FreeBSD.
+Corrected:      2015-12-21 14:32:29 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2016-01-13 05:32:24 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+
+For general information regarding FreeBSD Errata Notices and Security
+Advisories, including descriptions of the fields above, security
+branches, and the following sections, please visit
+<URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+The YP/NIS subsystem allows network management of passwd, group, netgroup,
+hosts, services, rpc, bootparams and ethers file entries.  The ypclnt suite
+provides an interface to the YP subsystem.
+
+The standard NIS protocol limits its database entries to YPMAXRECORD (1024
+characters).
+
+II.  Problem Description
+
+There is a bug with the NIS client library, which can lead to an infinite
+loop.
+
+III. Impact
+
+A server that is deliberately configured to violate the NIS/YP protocol can
+cause a FreeBSD NIS client to be stuck forever.
+
+IV.  Workaround
+
+No workaround is available, but systems that are not configured to use
+NIS/YP are not affected.
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your system to a supported FreeBSD stable or release / security
+branch (releng) dated after the correction date.
+
+A reboot is recommended.
+
+2) To update your system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+A reboot is recommended.
+
+3) To update your system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/EN-16:03/yplib.patch
+# fetch https://security.FreeBSD.org/patches/EN-16:03/yplib.patch.asc
+# gpg --verify yplib.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
+
+A reboot is recommended.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/9/                                                         r293804
+releng/9.3/                                                       r293896
+stable/10/                                                        r292547
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+<URL:https://reviews.freebsd.org/D4095>;
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-16:03.ypclnt.asc>;
+-----BEGIN PGP SIGNATURE-----
+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+=A4Qy
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-SA-16:01.sctp.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:01.sctp.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,145 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:01.sctp                                       Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          SCTP ICMPv6 error message vulnerability
+
+Category:       core
+Module:         SCTP
+Announced:      2016-01-14
+Credits:        Jonathan T. Looney
+Affects:        All supported versions of FreeBSD
+Corrected:      2016-01-14 09:11:42 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2016-01-14 09:11:48 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+CVE Name:       CVE-2016-1879
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+The Stream Control Transmission Protocol (SCTP) protocol provides reliable,
+flow-controlled, two-way transmission of data. 
+
+The Internet Control Message Protocol for IPv6 (ICMPv6) provides a way for
+hosts on the Internet to exchange control information.  Among other uses,
+a host or router can use ICMPv6 to inform a host when there is an error
+delivering a packet sent by that host. 
+
+II.  Problem Description
+
+A lack of proper input checks in the ICMPv6 processing in the SCTP stack
+can lead to either a failed kernel assertion or to a NULL pointer
+dereference.  In either case, a kernel panic will follow.
+
+III. Impact
+
+A remote, unauthenticated attacker can reliably trigger a kernel panic
+in a vulnerable system running IPv6.  Any kernel compiled with both IPv6
+and SCTP support is vulnerable.  There is no requirement to have an SCTP
+socket open.
+
+IPv4 ICMP processing is not impacted by this vulnerability.
+
+IV.  Workaround
+
+No workaround is available, but systems using a kernel compiled without
+SCTP support or IPv6 support are not vulnerable.
+
+In addition, some stateful firewalls may block ICMPv6 messages that are
+not responding to a legitimate connection.  (However, this may not
+completely block the problem, as an ICMPv6 message could still be sent
+in response to a legitimate SCTP connection.)
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+Rebooting to the new kernel is required.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+Rebooting to the new kernel is required.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-16:01/sctp.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:01/sctp.patch.asc
+# gpg --verify sctp.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html>; and reboot the
+system.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/9/                                                         r293898
+releng/9.3/                                                       r293896
+stable/10/                                                        r293897
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1879>;
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:01.sctp.asc>;
+-----BEGIN PGP SIGNATURE-----
+
+iQIcBAEBCgAGBQJWl2j1AAoJEO1n7NZdz2rnIfoQAOZTLX3VovQPGj9wr7PspLQi
+Tazu6vRnjzdOdjpeWwSgYlq6DJGjT71c/BRyCWCoijr2uyBWRlANqzMO64thuTzx
+gc6juRlChLDF4sNVWbNDMRwuHTfCpgDH2/4hQeR/9CmiQxHJyqL0gXc889D206i9
+KzgmYrSALEVK0E2kDBeRMsadtqPIEzCw4LygWd4qrtYNPjAfBR/a9U4rg7ZN0ICZ
+RCPnkAF6qI09B931QfHaI4C9wdBF8DJ6nKN/2aU9ATdOJJb7oUkpaHht8kmbdZS+
+Tn12nEXkQvNxuAKT7Fb87M14s7LUR12V5wgDeMd2UtOfkeSpGEDFACdhYW3IpKan
+gD+2IlzLRhoQTJ7lQWMRTKh3OiDDR2kLwvbEU7BGecDSG6fVkgumn6NlHYybdH7L
+axpDOxPz8ITfcdRipIXLOQEC308ckdmaEwqi4ikgBGwEkSgIwj1flGStswvcMrim
+vT0xof2dv1y6RW5xYnJF7Mtn/rEcqrql/BeBp/kxJZ2Qt3hkppQnjWD6kvrEj00s
+CajzxdBTM7J3buDzu++RL2GL9p5Cwo1kDmUJdWimIbSecL62J9+PwFCDYp/dOy25
+GAPGnf7gk8YhwM8pHwLtcX0b9UundkXLWnLBN7R12fL7Ch2CmPbgPcoFc5CSbcIx
+TBRU+4TGcNGxigXyzIHT
+=G0DD
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-SA-16:02.ntp.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:02.ntp.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,155 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:02.ntp                                        Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          ntp panic threshold bypass vulnerability
+
+Category:       contrib
+Module:         ntp
+Announced:      2016-01-14
+Credits:        Network Time Foundation
+Affects:        All supported versions of FreeBSD.
+Corrected:      2016-01-11 01:09:50 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2016-01-11 01:48:16 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+CVE Name:       CVE-2015-5300
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+The ntpd(8) daemon is an implementation of the Network Time Protocol (NTP)
+used to synchronize the time of a computer system to a reference time
+source.
+
+II.  Problem Description
+
+The ntpd(8) daemon has a safety feature to prevent excessive stepping of
+the clock called the "panic threshold".  If ever ntpd(8) determines the
+system clock is incorrect by more than this threshold, the daemon exits.
+There is an implementation error within the ntpd(8) implementation of this
+feature, which allows the system time be adjusted in certain circumstances.
+
+III. Impact
+
+When ntpd(8) is started with the '-g' option specified, the system time will
+be corrected regardless of if the time offset exceeds the panic threshold (by
+default, 1000 seconds).  The FreeBSD rc(8) subsystem allows specifying the
+'-g' option by either including '-g' in the ntpd_flags list or by enabling
+ntpd_sync_on_start in the system rc.conf(5) file.
+
+If at the moment ntpd(8) is restarted, an attacker can immediately respond to
+enough requests from enough sources trusted by the target, which is difficult
+and not common, there is a window of opportunity where the attacker can cause
+ntpd(8) to set the time to an arbitrary value.
+
+IV.  Workaround
+
+No workaround is available, but systems not running ntpd(8), or running
+ntpd(8) but do not use ntpd_sync_on_start="YES" or specify the '-g' option in
+ntpd_flags are not affected.  Neither of these are set by default.
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+The ntpd service has to be restarted after the update.  A reboot is
+recommended but not required.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+The ntpd service has to be restarted after the update.  A reboot is
+recommended but not required.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+[FreeBSD 10.1 and 10.2]
+# fetch https://security.FreeBSD.org/patches/SA-16:02/ntp-10.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:02/ntp-10.patch.asc
+# gpg --verify ntp-10.patch.asc
+
+[FreeBSD 9.3]
+# fetch https://security.FreeBSD.org/patches/SA-16:02/ntp-9.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:02/ntp-9.patch.asc
+# gpg --verify ntp-9.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
+
+Restart the applicable daemons, or reboot the system.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/9/                                                         r293652
+releng/9.3/                                                       r293896
+stable/10/                                                        r293650
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+<URL:https://www.cs.bu.edu/~goldbe/NTPattack.html>;
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300>;
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:02.ntp.asc>;
+-----BEGIN PGP SIGNATURE-----
+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+=il8c
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-SA-16:03.linux.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:03.linux.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,133 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:03.linux                                      Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          Linux compatibility layer incorrect futex handling
+
+Category:       core
+Module:         kernel
+Announced:      2016-01-14
+Credits:        Mateusz Guzik
+Affects:        All supported versions of FreeBSD.
+Corrected:      2016-01-14 09:11:42 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2016-01-14 09:11:48 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+CVE Name:       CVE-2016-1880
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:http://security.FreeBSD.org/>.
+
+I.   Background
+
+FreeBSD is binary-compatible with the Linux operating system through a
+loadable kernel module/optional kernel component.  The support is
+provided on amd64 and i386 machines.
+
+II.  Problem Description
+
+A programming error in the handling of Linux futex robust lists may result
+in incorrect memory locations being accessed.
+
+III. Impact
+
+It is possible for a local attacker to read portions of kernel memory, which
+may result in a privilege escalation. 
+
+IV.  Workaround
+
+No workaround is available, but systems not using the Linux binary
+compatibility layer are not vulnerable.
+
+The following command can be used to test if the Linux binary
+compatibility layer is loaded:
+
+# kldstat -m linuxelf
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:   
+
+# freebsd-update fetch
+# freebsd-update install
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+2) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable  
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch http://security.FreeBSD.org/patches/SA-16:03/linux.patch
+# fetch http://security.FreeBSD.org/patches/SA-16:03/linux.patch.asc
+
+b) Apply the patch.
+
+# cd /usr/src
+# patch < /path/to/patch
+# cd /usr/src/amd64/linux32
+# make sysent
+# cd /usr/src/i386/linux
+# make sysent
+
+c) Recompile your kernel and modules as described in
+<URL:http://www.FreeBSD.org/handbook/kernelconfig.html>.
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+VI.  Correction details
+
+The following list contains the revision numbers of each file that was
+corrected in FreeBSD.
+
+Subversion:
+
+Branch/path                                                      Revision
+- ---------------------------------------------------------------------------
+stable/9/                                                         r293898
+releng/9.3/                                                       r293896
+stable/10/                                                        r293897
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- ---------------------------------------------------------------------------
+
+VII. References
+
+<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1880>;
+
+The latest revision of this advisory is available at
+<URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-16:03.linux.asc>;
+-----BEGIN PGP SIGNATURE-----
+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+=OQft
+-----END PGP SIGNATURE-----

Added: head/share/security/advisories/FreeBSD-SA-16:04.linux.asc
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:04.linux.asc	Thu Jan 14 09:40:53 2016	(r48011)
@@ -0,0 +1,145 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:04.linux                                      Security Advisory
+                                                          The FreeBSD Project
+
+Topic:          Linux compatibility layer setgroups(2) system call
+                vulnerability
+
+Category:       core
+Module:         kernel
+Announced:      2016-01-14
+Credits:        Dmitry Chagin
+Affects:        All supported versions of FreeBSD
+Corrected:      2016-01-14 09:11:42 UTC (stable/10, 10.2-STABLE)
+                2016-01-14 09:10:46 UTC (releng/10.2, 10.2-RELEASE-p9)
+                2016-01-14 09:11:16 UTC (releng/10.1, 10.1-RELEASE-p26)
+                2016-01-14 09:11:48 UTC (stable/9, 9.3-STABLE)
+                2016-01-14 09:11:26 UTC (releng/9.3, 9.3-RELEASE-p33)
+CVE Name:       CVE-2016-1881
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+I.   Background
+
+FreeBSD is binary-compatible with the Linux operating system through a
+loadable kernel module/optional kernel component.  The support is
+provided on amd64 and i386 machines.
+
+II.  Problem Description
+
+A programming error in the Linux compatibility layer setgroups(2) system
+call can lead to an unexpected results, such as overwriting random kernel
+memory contents.
+
+III. Impact
+
+It is possible for a local attacker to overwrite portions of kernel
+memory, which may result in a privilege escalation or cause a system
+panic.
+
+IV.  Workaround
+
+No workaround is available, but systems not using the Linux binary
+compatibility layer are not vulnerable.
+
+The following command can be used to test if the Linux binary
+compatibility layer is loaded:
+
+# kldstat -m linuxelf
+
+V.   Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-16:04/linux.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:04/linux.patch.asc
+# gpg --verify linux.patch.asc
+
+b) Apply the patch.  Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+# cd /usr/src/amd64/linux32
+# make sysent
+# cd /usr/src/i386/linux
+# make sysent
+
+c) Recompile your kernel as described in
+<URL:https://www.FreeBSD.org/handbook/kernelconfig.html>.
+
+Reboot the system or unload and reload the linux.ko kernel module.
+
+VI.  Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path                                                      Revision
+- -------------------------------------------------------------------------
+stable/9/                                                         r293898
+releng/9.3/                                                       r293896
+stable/10/                                                        r293897
+releng/10.1/                                                      r293894
+releng/10.2/                                                      r293893
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
+
+VII. References
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1881>;
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:04.linux.asc>;
+-----BEGIN PGP SIGNATURE-----
+
+iQIcBAEBCgAGBQJWl2j3AAoJEO1n7NZdz2rnstMP/jddSJehSXe9rlL2qhYfRrQY
+XZSuoOtolvcl2xSQCZYprXN95/i890VOdJ9x4+iYJA2IQO55a8MjS1DcJjjonV7J
+zJa7Apnu1jaK1jDx+RL6C3eVDff0ss1B7NvZTXmjHn+nIsIRxd6vzxDp2NujTnWS

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601140940.u0E9erMP028957>