Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Dec 2000 03:42:05 +0200
From:      Esa Etelavuori <eetelavu@cc.hut.fi>
To:        security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-00:77.procfs
Message-ID:  <20001219034205.A29042@ksylofoni.hut.fi>
In-Reply-To: <20001218153619.071BE37B400@hub.freebsd.org>; from security-advisories@FreeBSD.ORG on Mon, Dec 18, 2000 at 07:36:19AM -0800
References:  <20001218153619.071BE37B400@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----

> Topic:          Several vulnerabilities in procfs
> Announced:      2000-12-18
> Affects:        Problem #1: FreeBSD 4.x prior to the correction date.
>                             FreeBSD 3.x is unaffected.
                                      ... except for procfs/ctl
>                 Problem #2, #3: FreeBSD 4.x and 3.x prior to the correction
>                             date.
> Corrected:      2000-12-16 (FreeBSD 4.2-STABLE)
>                 2000-12-18 (FreeBSD 3.5.1-STABLE)

Looks fine but the story is quite unfortunate. I heard afterwards
from Frank van Vliet that they notified security-officer@freebsd.org about
procfs/mem problems on October 25. I mailed the FreeBSD team about the 
procfs/status buffer overflow on October 27.

I quickly got confirmation emails, but a public announcement seemed
to take ages although fixes had been committed to -current in two weeks.
I asked about the status and agreed that it would be ok for me to wait for
the advisory until the soon coming release of 4.2.

After 4.2 had been released I got a draft advisory, checked the fixes
and noticed that the procfs/ctl fix was missing. I emailed about it on
November 25.

Looking at the CVS repository it seems that procfs/ctl had been broken
in FreeBSD since procfs was implemented. It was corrected in OpenBSD in
1996 and in NetBSD in 1997. Procfs/{mem,regs} had been corrected in 1997
(mem was still otherwise broken until early 2000), but the CHECKIO()
checks were incorrectly replaced about a year ago.

Afterwards it seems like a mistake to wait for over 7 weeks when partial
fixes had been on the public CVS for most of the time. Now I wonder how
many of "bad guys" actually scan for those changes, apparently one could get
atleast several days advantage with many open source projects.

CVS changes/notes can be very revealing for automated scanners, and
there probably has been other silent "minor" fixes in addition to
netgraph(3) loading kernel modules regardless of the securelevel on <4.1
(pointed to me by Pascal Bouchareine).

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (DreamOS)
Comment: http://www.iki.fi/ee/08C1E33D.asc

iQCVAwUBOj68r1ZDrCkIweM9AQGuwQP9HPfsTi0BFe6V237BaFUfOMI9CLfdEqNv
ojK4CGCrXZlc6FjOTAiO8BehQPnKm18dV1zePIiYFqoUTfSwNgNC428sMa5SayIX
aHBkxwe/+arBaoxhd1BGtxdrnjT59ud3wqQiew2W3irX9KE4JQRyO//Zpcopt5m4
Pa9GRcdieTQ=
=+XaS
-----END PGP SIGNATURE-----


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001219034205.A29042>