Date: Thu, 19 Mar 2020 17:20:56 +0000 (UTC) From: Gordon Tetlow <gordon@FreeBSD.org> To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53996 - in head/share: security/advisories security/patches/EN-20:03 security/patches/EN-20:04 security/patches/EN-20:05 security/patches/EN-20:06 security/patches/SA-20:04 security/pa... Message-ID: <202003191720.02JHKuok043807@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: gordon (src committer) Date: Thu Mar 19 17:20:56 2020 New Revision: 53996 URL: https://svnweb.freebsd.org/changeset/doc/53996 Log: Add EN-20:03 through EN-20:06 and SA-20:04 through SA-20:09. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-20:03.sshd.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:04.pfctl.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:05.mlx5en.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:06.ipv6.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:04.tcp.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:05.if_oce_ioctl.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:06.if_ixl_ioctl.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:07.epair.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:08.jail.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:09.ntp.asc (contents, props changed) head/share/security/patches/EN-20:03/ head/share/security/patches/EN-20:03/sshd.patch (contents, props changed) head/share/security/patches/EN-20:03/sshd.patch.asc (contents, props changed) head/share/security/patches/EN-20:04/ head/share/security/patches/EN-20:04/pfctl.patch (contents, props changed) head/share/security/patches/EN-20:04/pfctl.patch.asc (contents, props changed) head/share/security/patches/EN-20:05/ head/share/security/patches/EN-20:05/mlx5en.patch (contents, props changed) head/share/security/patches/EN-20:05/mlx5en.patch.asc (contents, props changed) head/share/security/patches/EN-20:06/ head/share/security/patches/EN-20:06/ipv6.patch (contents, props changed) head/share/security/patches/EN-20:06/ipv6.patch.asc (contents, props changed) head/share/security/patches/SA-20:04/ head/share/security/patches/SA-20:04/tcp.patch (contents, props changed) head/share/security/patches/SA-20:04/tcp.patch.asc (contents, props changed) head/share/security/patches/SA-20:05/ head/share/security/patches/SA-20:05/if_oce_ioctl.patch (contents, props changed) head/share/security/patches/SA-20:05/if_oce_ioctl.patch.asc (contents, props changed) head/share/security/patches/SA-20:06/ head/share/security/patches/SA-20:06/if_ixl_ioctl.patch (contents, props changed) head/share/security/patches/SA-20:06/if_ixl_ioctl.patch.asc (contents, props changed) head/share/security/patches/SA-20:07/ head/share/security/patches/SA-20:07/epair.11.patch (contents, props changed) head/share/security/patches/SA-20:07/epair.11.patch.asc (contents, props changed) head/share/security/patches/SA-20:07/epair.12.patch (contents, props changed) head/share/security/patches/SA-20:07/epair.12.patch.asc (contents, props changed) head/share/security/patches/SA-20:08/ head/share/security/patches/SA-20:08/kern_jail.patch (contents, props changed) head/share/security/patches/SA-20:08/kern_jail.patch.asc (contents, props changed) head/share/security/patches/SA-20:09/ head/share/security/patches/SA-20:09/ntp.11.3.patch (contents, props changed) head/share/security/patches/SA-20:09/ntp.11.3.patch.asc (contents, props changed) head/share/security/patches/SA-20:09/ntp.11.patch (contents, props changed) head/share/security/patches/SA-20:09/ntp.11.patch.asc (contents, props changed) head/share/security/patches/SA-20:09/ntp.12.1.patch (contents, props changed) head/share/security/patches/SA-20:09/ntp.12.1.patch.asc (contents, props changed) head/share/security/patches/SA-20:09/ntp.12.patch (contents, props changed) head/share/security/patches/SA-20:09/ntp.12.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-20:03.sshd.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:03.sshd.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,119 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:03.sshd Errata Notice + The FreeBSD Project + +Topic: Misleading log messages upon successful sshd login + +Category: contrib +Module: sshd +Announced: 2020-03-19 +Affects: FreeBSD 12.1 +Corrected: 2019-11-28 02:18:19 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:34:11 UTC (releng/12.1, 12.1-RELEASE-p3) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +The sshd server implements the secure shell protocol, providing remote +access. + +II. Problem Description + +Due to a programming error, error messages of the form "Failed unknown for +user <user> ..." will be emitted to auth.log for successful logins. + +III. Impact + +Log files will be confusing, and programs like fail2ban that parse logs will +not function correctly. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and restart the sshd +service. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# nohup service sshd restart + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:03/sshd.patch +# fetch https://security.FreeBSD.org/patches/EN-20:03/sshd.patch.asc +# gpg --verify sshd.patch.asc + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r355160 +releng/12.1/ r359134 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=234793> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:03.sshd.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zplJfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJLCA//V8LAaiI3320RkieKpp1W8VJLajd1aWnwmMzCMuyXYsEnDoLRzGdsEdcv +K1HhEz27vEuhusmW6AwLGcuHDJl+/230JJMcs24dtbJ/VcanG4Tw5fKjT6g1zT9m +A8ZQ16N5LU8q8TGcRATie9+88Ri3iepDkur4Gh4HBH/VKfI4szoWZXpBe0UZJTPr +EGXtcvTRlVlex3jWJF2FA/4TioR6PGAyJxwtxLpaSWoMJFrTKh0b7AnyCTzqC6cE +aHF/RDH8i16VbVDTHmfo0FPKeCcF25uFYG1edDpSofdvE9XZTEvqy1fz6Nv+LEbp +EMFOa99zUtzjWVkvPMXWXSYDVivyjoX38pEvbZnNxWNot8His9UWOss9vff9/B/L +Y6uHIpPeW8JhBpyOJ6hlYZ/zkEnKy33tNm+/mzV6TBUpu0h8cTULKkXCeIQIyU61 +YUGEhw+TFRS0X9v6lovXif3/Cs6r8nNKSh/NUa43B7oxacEsCimfU1YApNi7nj3L +DD1vQmvR7j7k8tTDw4FGqv3HgkRL4RgkbWsGJB83dUXTEUV/Dtjh6o7duTsYbdw0 +eEaqTQBysENCQEsZ3s0NHF0nUdrmxecw/6US+dhnt1nMJH7I4UaHM95wMXY0x3CQ +k5yDoMPMs4NTC7iBRtyw69IQMsOwRsUU5notdlWjklKKSvRAXnA= +=8o6k +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:04.pfctl.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:04.pfctl.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,132 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:04.pfctl Errata Notice + The FreeBSD Project + +Topic: Missing pfctl(8) tunable + +Category: core +Module: pfctl(8) +Announced: 2020-03-19 +Credits: Rubicon Communications, LLC (netgate.com) +Affects: FreeBSD 11.3-RELEASE +Corrected: 2020-02-12 14:50:13 UTC (stable/11, 11.3-STABLE) + 2020-03-19 16:35:15 UTC (releng/11.3, 11.3-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +Packet filtering takes place in the kernel. A pseudo-device, /dev/pf, allows +userland processes to control the behavior of the packet filter through an +ioctl(2) interface. Commands include enabling and disabling the filter, +loading rulesets, adding and removing individual rules or state table entries, +and retrieving statistics. The most commonly used functions are covered by +the pfctl(8) utility. + +II. Problem Description + +pf(4) ioctls frequently take a variable number of elements as argument. +This can potentially allow users to request very large allocations. + +A failing non-blocking pf(4) allocation can tie up resources resulting in +concurrent blocking allocations entering vm_wait() and inducing reclamation +of caches. + +III. Impact + +The kernel will reject very large tables to avoid resource exhaustion +attacks. Some users run into this limit with legitimate table +configurations. + +IV. Workaround + +No workaround is available, however systems that do not employ pf(4) nor +use pf(4) table definitions larger than 65535 entries are unaffected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an errata update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/EN-20:04/pfctl.patch +# fetch https://security.FreeBSD.org/patches/EN-20:04/pfctl.patch.asc +# gpg --verify pfctl.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/11/ r357822 +releng/11.3/ r359135 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:04.pfctl.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zpldfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cL4Aw/9GhPqyMcVMROjoX2xepwOubsM+C9lMCTQtxOOhYLtt9IIt5KTgSefAcyt +DMcqE78R6wgaxf08XAQyD/iN3udhCFT4YRElB1o5XMEhYUcCIsatKcb8hIVJuRD3 +Ap2goT7zHlicFxpKuWblg/qenU0A9PgaCjsRaVePHS2nzOW+d9DJSg3yxz6xwGCZ +Nuv03Y2OBVm/KdW4awk50FdzR2L04U0D0ZATh+5yr25aH99dVpUQMmRc+qjRtXzh +4j34Qj8mWteAkD5690zcE1nGwu7lGDFoRjwhiP5RP9Gn3o2Sv5SJwHNwB5W1WQDr +GAormcXgUwuWwd9ijtKfWNmJm7MhZhCjvq9l0tt54e+j4Nmz39/ZijFfa1Ug7XKJ +4yp1ey2ri3W3bGrv2nRHMzY6d3EaQq/96vupt/dWxlufoIHbUvUQ0l8KWNmQ8kK1 +dplsoMS6x/AeFjjF4I62Cp429vBbpRDRCJk4mZ6itJ8CWbNXIv2xCj7aKzRcrwpx +kmcblpkFpm7edVkTGjtv/MMhUPXdlskQStOCjSkHoo/cofcAOUovJ8755AvYNkwl +P0e49iOxvFFMA3jZSuxCrQksHq295VwjImEUSJKYyARGdDiPR4q8AdUy+CPyDoLs +zMrzZz5HiNSNdoh4mX3OFIkjtuk/fXR5LQnMBuzHfmfhLtsmHAQ= +=upRR +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:05.mlx5en.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:05.mlx5en.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,122 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:05.mlx5en Errata Notice + The FreeBSD Project + +Topic: Fix packet forwarding performance in mlx5en(4) driver + +Category: core +Module: mlx5en +Announced: 2020-03-19 +Affects: FreeBSD 12.1 +Corrected: 2019-11-07 13:12:38 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:41:29 UTC (releng/12.1, 12.1-RELEASE-p3) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +Add CSUM_SND_TAG flag and set this flag for outgoing ratelimited mbufs. +This fixes an issue that redirected packets are dropped in the mlx5en +transmit routine. + +II. Problem Description + +Ratelimiting support in the network stack reuses an mbuf field for a +different purpose to avoid having to grow the mbuf size. This can a cause +packet drop in the forwarding case if the field in question is not cleared +prior to transmit. + +III. Impact + +All packets going through firewall code are dropped when using mlx5en(4). + +IV. Workaround + +No workaround is available. Systems not using mlx5en(4) are not affected. + +V. Solution + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# reboot + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 12.1] +# fetch https://security.FreeBSD.org/patches/EN-20:05/mlx5en.patch +# fetch https://security.FreeBSD.org/patches/EN-20:05/mlx5en.patch.asc +# gpg --verify mlx5en.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r354440 +releng/12.1/ r359136 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243871> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:05.mlx5en.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zpldfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIMCw/7BCNrVg/W7nwnbDdQs1xR0gTz4pUTGB7SnyXs69kJ15dimWt00oVCJurP +oh7uZIPenrS/xRosmbehsNc3IJRN6Npnf86dazuj3qRu24E3CJg9bQJ0sAHrWOXB +i6UgrWIDKIEQ/Yflpcl4bqj/L5HQsTQ/mbkBl1nYiu7VUwjGPhidRYSCQQHDY8ZM +XJ4BFBJCx+gSEcfP6iAqZTGcDAwyFkl9kzxfMIymIRqGlBABBqN6OFrnMjiBoDGL +CiTFt0rFs4/bdX8wQyRhQ6IHjFGiEbXZS4txJxP3XZaIJaPYF5snrrV1rgGjOeVl +2PmGF82ugSwrpVgPuDCMkiJEvYR6matvjRrYQDEBsz0rY6pyid4q9Ck7uKt2KW8u +M3tPtL61SbnuPXTYGpFD++xWYjlQrkcuudwHRT3NYOgNAwU6U+ejLuDzpbWFtPAh +RCQ/tmSOxTQWubxbiwiA07zxVY1a2ffguyzpc+p8PTwIbgrtuh64saoenuvNg0wJ +rhuShGQnhsfWbStOW1T21tsBkB/cZekQYt3e9zB3RREl3WBvJmKPLqO0m8WBaSUx +2iTxnMrhEAnD4R6oVouibCwRdlnxMD3xyYmJJZJ/p8hFXVZlWm60c5nKh82bQVLj +mN4Uf+V7Q/P+fkfoWFm7Dq4kYQp7DmANjh2gK80/88f9/AhX+so= +=EjZa +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:06.ipv6.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:06.ipv6.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:06.ipv6 Errata Notice + The FreeBSD Project + +Topic: Incorrect checksum calculations with IPv6 extension headers + +Category: core +Module: netinet6 +Announced: 2020-03-19 +Credits: Francis Dupont <fdupont@isc.org> +Affects: All supported versions of FreeBSD. +Corrected: 2020-03-02 22:54:32 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:43:37 UTC (releng/12.1, 12.1-RELEASE-p3) + 2020-03-03 08:24:09 UTC (stable/11, 11.3-STABLE) + 2020-03-19 16:43:37 UTC (releng/11.3, 11.3-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +Upper layer transport protocols, e.g., TCP, UDP, or SCTP, include +checksums in their headers. IPv6 is a network protocol, which can +add extension headers between its own header and that of the upper +layer protocol. + +II. Problem Description + +Pseudo header checksum calculations can be delayed until the IPv6 +output routine or offloaded to the NIC. In case IPv6 extension +headers are present, FreeBSD currently never offloads to the NIC. +When passing the data to the functions doing the delayed checksum +calculations, the contents of the extension headers were erroneously +included as part of the checksum. + +III. Impact + +Upper layer transport protocol checksums may be wrong for IPv6 packets, +such as IPv6 fragments, or IPv6 packets with a Destination Options or +Hop-by-Hop Options extension header. + +IV. Workaround + +No workaround is available. Packets sent over IPv4 or IPv6 without +any extension headers are unaffected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for errata update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/EN-20:06/ipv6.patch +# fetch https://security.FreeBSD.org/patches/EN-20:06/ipv6.patch.asc +# gpg --verify ipv6.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r358557 +releng/12.1/ r359137 +stable/11/ r358566 +releng/11.3/ r359137 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243675> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:06.ipv6.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zpldfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLxaA/+IUDfq39zppv1SsIrwD1a2VZVQvPtNPmM0OUzJK7gt6Jj1lDJjY/WTXl6 +I93Xm1q6VL6u+6n95XfaUe3xu05Oujlq+KE0zu3tOigs50tvyn2+PAQU1waTT3O7 +zFqqLb0mBoQl1WasiLj0NhIpAK3GDYNV/Zd0jYuQzyyhu1kahMpeiVYn5OG7Q1C0 +BUPfObwGfzDYZbDtT4RSok35uVfzLnk5mZ1L+grQaoZbh3OJonlx5GnbRAboncCY +IJRfeyrHvCX2WMKx0CiUTEHZKJErKWcynYHkWYc+jmSqfTFARWBdIHpxQzF52kuW +E34WQDuCf9miSRGrlV1CgwjXUExuPOcUN7XcRRJQkkjc2wnpjMi1qudpyZmNW7Ig +rMQQdRLAmHyuy8ZjNuuBesWqBZYC2pr1p94KGUO7VsRNRVWOe8CEBT5NCRcRzoqw +rhyGlS1ahc6P/6FliYd86MMpdS4S0olRcylW+r5z3O8DStt0VEvwC5cYubqJJDud +Crpuces4hq8xZ2E4ZVN2YclT/gKNNvtNXmPfqpWVLdtCJqg6JTjAShX/YH52Q3/Q +5VOqj1wJmAMV07f68gp6GH+dQIxAnI5uAXwrGBs5Y7PCzRafhUkEy/6m5FHYOpUN +CR+/5Iqp2S79LeAoxSbZmuVh1pmLrs6bVZcfI21V91d5hSniPPE= +=/jJ1 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:04.tcp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:04.tcp.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,144 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:04.tcp Security Advisory + The FreeBSD Project + +Topic: TCP IPv6 SYN cache kernel information disclosure + +Category: core +Module: tcp +Announced: 2020-03-19 +Credits: Michael Tuexen (Netflix, contractor) +Affects: All supported versions of FreeBSD. +Corrected: 2020-03-08 14:48:21 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:46:01 UTC (releng/12.1, 12.1-RELEASE-p3) + 2020-03-08 14:48:32 UTC (stable/11, 11.3-STABLE) + 2020-03-19 16:46:01 UTC (releng/11.3, 11.3-RELEASE-p7) +CVE Name: CVE-2020-7451 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The Internet Protocol version 6 (IPv6) header contains a one byte field +called Traffic Class. Two bits of this field are used for Explicit +Congestion Notification (ECN), the other six bits are used as Differentiated +Services Field Codepoints (DSCP). + +The Transmission Control Protocol (TCP) is a connection oriented transport +protocol, which can be used as an upper layer of IPv6. A TCP endpoint is +either acting as a client (sending initially a SYN segment) or as a server +(initially waiting to receive a SYN segment and then responding with a +SYN-ACK segment). + +To mitigate the impact of some attacks against TCP servers (like +SYN-flooding), FreeBSD uses specific code to handle the TCP connection setup +for servers. This includes the transmission and retransmission of SYN-ACK +segments or responding with a challenge ACK segment to a received RST +segment. + +II. Problem Description + +When a TCP server transmits or retransmits a TCP SYN-ACK segment over IPv6, +the Traffic Class field is not initialized. This also applies to challenge ACK +segments, which are sent in response to received RST segments during the TCP +connection setup phase. + +III. Impact + +For each TCP SYN-ACK (or challenge TCP-ACK) segment sent over IPv6, one byte +of kernel memory is transmitted over the network. + +IV. Workaround + +No workaround is available. Systems not using IPv6 are unaffected. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:04/tcp.patch +# fetch https://security.FreeBSD.org/patches/SA-20:04/tcp.patch.asc +# gpg --verify tcp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r358739 +releng/12.1/ r359138 +stable/11/ r358740 +releng/11.3/ r359138 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7451> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:04.tcp.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zplhfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLuzQ/9HvuKX5w2/CDerZPseNDKqumxjoap6MjfExvpVN4Auy31wcE7248JpZ/d +I+Be927dmghiey97opVcR56g5OJ9QAinQRTWX1rLKaQ2xldGFE5924iLyQ/hjMXG +LDkYrBpJ2Wkdq9XFZKAuu2dpV/RUMlGnKANG/QfAAd5V4VC7Sg5X6ty7ISlVMrM7 +aQdBP4e5XyssfeqZeZ/A57dF3Yi7F1TEEjXeM+dulTET4nm0+w74n+QaNoH6hcMI +n3Bb/SsF9HfbZtXz235vkzbgvvSX4f+D/d3vrcAA9KMVjKBH6QbiwJKuHSdb0GY8 +ENMb7vO7Rx71u8GnCYg659qFrWb/kaTW2BCbgAJyp2747nAw8I7DwZiN2RKWA7qh +JbcZb1rJN9gEccnGyNouuy4DzUlUc4VQnp4ajqV4S1YGbwdfsBqi2c0dYwqEcW96 +RKxxTrH9JB8d52wMMshB7hMfwbeLeOJJ4phFL8knXuv19SWCP/tz6XDopoBN6wTW +yn5g+n7oVCOsSwlPLHl/5WWUTvKjyCB6eZIblFhlbiNTuQiUaegDXx66On+vgVKD +oYA9cDQUcvIKLne/KgCqTQ5MAuwE/7hPyUlGmuiZ3/Qx6CW568+v1kTc19eUQb0a ++e5HDRFhtiQyRMpTC9Yt14sv8oFLynhyt/IbQWTeqppZhBugbJ8= +=CFKz +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:05.if_oce_ioctl.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:05.if_oce_ioctl.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,132 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:05.if_oce_ioctl Security Advisory + The FreeBSD Project + +Topic: Insufficient oce(4) ioctl(2) privilege checking + +Category: core +Module: oce(4) +Announced: 2020-03-19 +Credits: Ilja Van Sprundel +Affects: All supported versions of FreeBSD. +Corrected: 2019-12-26 16:56:42 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:48:29 UTC (releng/12.1, 12.1-RELEASE-p3) + 2019-12-26 16:58:11 UTC (stable/11, 11.3-STABLE) + 2020-03-19 16:48:29 UTC (releng/11.3, 11.3-RELEASE-p7) +CVE Name: CVE-2019-15876 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The primary interface used for network driver configuration is ioctl(2). +Several ioctl(2) commands are reserved for driver-specific purposes. For +instance, a driver may use one of these ioctls to implement an interface for +updating device firmware. + +II. Problem Description + +The driver-specific ioctl(2) command handlers in oce(4) failed to check +whether the caller has sufficient privileges to perform the corresponding +operation. + +III. Impact + +The oce(4) handler permits unprivileged users to send passthrough commands to +device firmware. + +IV. Workaround + +No workaround is available. Systems that do not contain devices driven by +oce(4) are unaffected. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:05/if_oce_ioctl.patch +# fetch https://security.FreeBSD.org/patches/SA-20:05/if_oce_ioctl.patch.asc +# gpg --verify if_oce_ioctl.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r356089 +releng/12.1/ r359139 +stable/11/ r356090 +releng/11.3/ r359139 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15876> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:05.if_oce_ioctl.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zplhfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJAuBAAnsnjdm2aTLo14rOiNHTNh0NqJPQTJ5F6MwE1P/nUlP5xM21GzDkyki7H +4AytZiCma6MCPzbc8aO6wGnc5zfSA1G/5TLetIgIQeyDQ8wRd0uhIoeO3NB3EXhz +KJkNqtyosmzKUSmq7V/WqYN7VOVceegvbvLXCMTYFkUmvJxYbB67s0upqydFBAD4 +j1ecKkNOIehV6cGColM3Dv7sJtVgdvaKg2ehW+AWR7UBOntIr/X3mVpkUE5Y2oLX +tpjuEbdraOpIw/ohKfvpZNPXnEFmhgxrRV4WRw8yFeMsEtLI2HyyUV4ysZrgMKB+ +LKxdhfd7HhIiGdoRZO4P60traRiRD+VfqU9Jt3xd9fO1t0MZYTS0R0Lqt9n3UPhR +26YcyrJgElaHIz8Viiw1U7Pdxila7b7gL+V4QVNSG00OqCKkdepgURRepzaz8Zhd +lrfLf+9vysPIL6RsJwDb77qYbu9kK/afGmadBVot6QGg6ovWVLUGd0pQFJuLihZl +YRocdxDO0lgF+w6llmp6ZidEjaScL7XG3yKG1DuoSa0tS+0eQU2U2hByJDzzzkTn +x7t7WU8o5gSRYDe68yuJHXiHWswA4IK+tkYf+h8fDhENDbt7PCo86Vq0Dixg3hoG +ak/KfomAAsnh6MfWNRlCWDXbe0p/yxYLPRHugDdrZ2IpX+uJWHs= +=pADZ +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:06.if_ixl_ioctl.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:06.if_ixl_ioctl.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,128 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:06.if_ixl_ioctl Security Advisory + The FreeBSD Project + +Topic: Insufficient ixl(4) ioctl(2) privilege checking + +Category: core +Module: ixl(4) +Announced: 2020-03-19 +Credits: Ilja Van Sprundel +Affects: All supported versions of FreeBSD. +Corrected: 2020-01-10 18:31:59 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:49:32 UTC (releng/12.1, 12.1-RELEASE-p3) +CVE Name: CVE-2019-15877 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The primary interface used for network driver configuration is ioctl(2). +Several ioctl(2) commands are reserved for driver-specific purposes. For +instance, a driver may use one of these ioctls to implement an interface for +updating device firmware. + +II. Problem Description + +The driver-specific ioctl(2) command handlers in ixl(4) failed to check +whether the caller has sufficient privileges to perform the corresponding +operation. + +III. Impact + +The ixl(4) handler permits unprivileged users to trigger updates to the +device's non-volatile memory (NVM). + +IV. Workaround + +No workaround is available. Systems that do not contain devices driven by +ixl(4) are unaffected. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:06/if_ixl_ioctl.patch +# fetch https://security.FreeBSD.org/patches/SA-20:06/if_ixl_ioctl.patch.asc +# gpg --verify if_ixl_ioctl.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r356606 +releng/12.1/ r359140 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15877> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:06.if_ixl_ioctl.asc> +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl5zplhfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIyvg/+Myq/m3iP2V8tluOVxVmXOEn9qULYfSEM8thr7N+EZpepK45KMkVeBMp5 +gGvd8XEbZyS1RSu+Knr3+yU+jQTFeVg/52QJ8fcTbH5r+5fcO0eJw9I0hwoJBAM+ +Fp7mTtON6PUCIlaXcwmFQfQ4l1iPee2qCsn7ia02dBFZXvHq6fT6tplSagtJj8Fd +xOBvnlf8obrvC+TswIKydCREaGAIRKTa0yMzh0Ml435gmCYMrGTe2NtjNKM9sgw8 +N0Y5QHuV59kiM3mYc5I7uLux1wUIlO6rdZ2lOsbuWNcW40q9IE1Gve9kjhmha8Ls +h7BW3VPLM8gxwrgJNygxSRtremDYfQZNoeONqRKd0C2H5EVT4vZfPRI4VxziNGU7 +US0VJwm7x/bET/zbVS5YIsGwqyn9kVjBRpv+eRN4CNmEoZugB/ZJn7lRhZ9cdsTG +fDM/ULk7UMPrap8ltr0hcYvLYzOmsR1K+oxqmWLzO2+FpnoUrAmWaInptbBuOaSj +tbmRc97wpR7LJcrmAo3rHvHdbwzY9jsQk1X1Y4LAKAr114S36m3HqwX5mhv91/ZR +oXOiDYCvFlf8BBQo5BMFDlSfft1Nd8iwAEumHmo+hFFs/yVwJlwwyt2tVwpT3V3Z +py6szSTnDzjslb/JGYI8ujpHNuJrfdWRmJUrXzqreKbiYA5pWGo= +=MmYl +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:07.epair.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:07.epair.asc Thu Mar 19 17:20:56 2020 (r53996) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:07.epair Security Advisory + The FreeBSD Project + +Topic: Incorrect user-controlled pointer use in epair + +Category: core +Module: kernel +Announced: 2020-03-19 +Credits: Ilja van Sprundel +Affects: All supported versions of FreeBSD. +Corrected: 2020-02-04 04:29:54 UTC (stable/12, 12.1-STABLE) + 2020-03-19 16:50:36 UTC (releng/12.1, 12.1-RELEASE-p3) + 2020-02-04 04:29:53 UTC (stable/11, 11.3-STABLE) + 2020-03-19 16:50:36 UTC (releng/11.3, 11.3-RELEASE-p7) +CVE Name: CVE-2020-7452 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The epair(4) interface provides a pair of virtual back-to-back connected +Ethernet interfaces. + +II. Problem Description + +Incorrect use of a potentially user-controlled pointer in the kernel allowed +vnet jailed users to panic the system and potentially execute aribitrary code +in the kernel. + +III. Impact + +Users with root level access (or the PRIV_NET_IFCREATE privilege) can panic +the system, or potentially escape the jail or execute arbitrary code with +kernel priviliges. + +IV. Workaround + +No workaround is available. Systems not using epair(4) are not vulnerable. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: *** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202003191720.02JHKuok043807>