From owner-dev-commits-ports-main@freebsd.org Thu May 27 05:17:42 2021 Return-Path: Delivered-To: dev-commits-ports-main@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3F6EA6326F2; Thu, 27 May 2021 05:17:42 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4FrGKf1DZpz3pFg; Thu, 27 May 2021 05:17:42 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 114D01E24C; Thu, 27 May 2021 05:17:42 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 14R5HfHs045884; Thu, 27 May 2021 05:17:41 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 14R5Hfdo045883; Thu, 27 May 2021 05:17:41 GMT (envelope-from git) Date: Thu, 27 May 2021 05:17:41 GMT Message-Id: <202105270517.14R5Hfdo045883@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Philip Paeps Subject: git: bbd2f19ba54f - main - security/vuxml: add FreeBSD SA-21:12.libradius MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: philip X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: bbd2f19ba54f58a026d153272a2dfced70a6bb87 Auto-Submitted: auto-generated X-BeenThere: dev-commits-ports-main@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commits to the main branch of the FreeBSD ports repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 May 2021 05:17:42 -0000 The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=bbd2f19ba54f58a026d153272a2dfced70a6bb87 commit bbd2f19ba54f58a026d153272a2dfced70a6bb87 Author: Philip Paeps AuthorDate: 2021-05-27 05:17:01 +0000 Commit: Philip Paeps CommitDate: 2021-05-27 05:17:36 +0000 security/vuxml: add FreeBSD SA-21:12.libradius --- security/vuxml/vuln.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2183734a60a3..88aa8a2a8528 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,48 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + FreeBSD -- Missing message validation in libradius(3) + + + FreeBSD + 13.013.0_1 + 12.212.2_7 + 11.411.4_10 + + + + +

Problem Description:

+

libradius did not perform sufficient validation of received messages.

+

rad_get_attr(3) did not verify that the attribute length is valid before + subtracting the length of the Type and Length fields. As a result, it + could return success while also providing a bogus length of SIZE_T_MAX - + 2 for the Value field.

+

When processing attributes to find an optional authenticator, + is_valid_response() failed to verify that each attribute length is + non-zero and could thus enter an infinite loop.

+

Impact:

+

A server may use libradius(3) to process messages from RADIUS clients. + In this case, a malicious client could trigger a denial-of-service in + the server. A client using libradius(3) to process messages from a + server is susceptible to the same problem.

+

The impact of the rad_get_attr(3) bug depends on how the returned length + is validated and used by the consumer. It is possible that libradius(3) + applications will crash or enter an infinite loop when calling + rad_get_attr(3) on untrusted RADIUS messages.

+ +
+ + CVE-2021-29629 + SA-21:12.libradius + + + 2021-05-27 + 2021-05-27 + +
+ FreeBSD-kernel -- SMAP bypass