Date: Thu, 27 May 2021 00:47:07 GMT From: Gordon Tetlow <gordon@FreeBSD.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org Subject: git: 72551dc011 - main - Add EN-21:11 to EN-21:16, SA-21:11, and SA-21:12. Message-ID: <202105270047.14R0l7BZ086882@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by gordon (src committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=72551dc01164fe7634a0e303c699e0b037e5f162 commit 72551dc01164fe7634a0e303c699e0b037e5f162 Author: Gordon Tetlow <gordon@FreeBSD.org> AuthorDate: 2021-05-27 00:46:06 +0000 Commit: Gordon Tetlow <gordon@FreeBSD.org> CommitDate: 2021-05-27 00:46:06 +0000 Add EN-21:11 to EN-21:16, SA-21:11, and SA-21:12. Approved by: so --- website/data/security/advisories.toml | 8 + website/data/security/errata.toml | 24 +++ .../security/advisories/FreeBSD-EN-21:11.aesni.asc | 136 +++++++++++++++++ .../advisories/FreeBSD-EN-21:12.divert.asc | 130 ++++++++++++++++ .../security/advisories/FreeBSD-EN-21:13.mpt.asc | 125 +++++++++++++++ .../security/advisories/FreeBSD-EN-21:14.pms.asc | 151 ++++++++++++++++++ .../advisories/FreeBSD-EN-21:15.virtio.asc | 125 +++++++++++++++ .../security/advisories/FreeBSD-EN-21:16.bc.asc | 160 +++++++++++++++++++ .../security/advisories/FreeBSD-SA-21:11.smap.asc | 167 ++++++++++++++++++++ .../advisories/FreeBSD-SA-21:12.libradius.asc | 170 +++++++++++++++++++++ .../static/security/patches/EN-21:11/aesni.patch | 79 ++++++++++ .../security/patches/EN-21:11/aesni.patch.asc | 16 ++ .../static/security/patches/EN-21:12/divert.patch | 94 ++++++++++++ .../security/patches/EN-21:12/divert.patch.asc | 16 ++ website/static/security/patches/EN-21:13/mpt.patch | 61 ++++++++ .../static/security/patches/EN-21:13/mpt.patch.asc | 16 ++ .../static/security/patches/EN-21:14/pms.12.patch | 71 +++++++++ .../security/patches/EN-21:14/pms.12.patch.asc | 16 ++ .../static/security/patches/EN-21:14/pms.13.patch | 81 ++++++++++ .../security/patches/EN-21:14/pms.13.patch.asc | 16 ++ .../static/security/patches/EN-21:15/virtio.patch | 155 +++++++++++++++++++ .../security/patches/EN-21:15/virtio.patch.asc | 16 ++ website/static/security/patches/EN-21:16/bc.patch | 11 ++ .../static/security/patches/EN-21:16/bc.patch.asc | 16 ++ .../static/security/patches/SA-21:11/smap.patch | 81 ++++++++++ .../security/patches/SA-21:11/smap.patch.asc | 16 ++ .../security/patches/SA-21:12/libradius.11.patch | 123 +++++++++++++++ .../patches/SA-21:12/libradius.11.patch.asc | 16 ++ .../security/patches/SA-21:12/libradius.patch | 133 ++++++++++++++++ .../security/patches/SA-21:12/libradius.patch.asc | 16 ++ 30 files changed, 2245 insertions(+) diff --git a/website/data/security/advisories.toml b/website/data/security/advisories.toml index b3a4c14939..ccb6c58848 100644 --- a/website/data/security/advisories.toml +++ b/website/data/security/advisories.toml @@ -1,6 +1,14 @@ # Sort advisories by year, month and day # $FreeBSD$ +[[advisories]] +name = "FreeBSD-SA-21:12.libradius" +date = "2021-05-26" + +[[advisories]] +name = "FreeBSD-SA-21:11.smap" +date = "2021-05-26" + [[advisories]] name = "FreeBSD-SA-21:10.jail_mount" date = "2021-04-06" diff --git a/website/data/security/errata.toml b/website/data/security/errata.toml index bf235e7212..de0a6f640f 100644 --- a/website/data/security/errata.toml +++ b/website/data/security/errata.toml @@ -1,6 +1,30 @@ # Sort errata notices by year, month and day # $FreeBSD$ +[[notices]] +name = "FreeBSD-EN-21:16.bc" +date = "2021-05-26" + +[[notices]] +name = "FreeBSD-EN-21:15.virtio" +date = "2021-05-26" + +[[notices]] +name = "FreeBSD-EN-21:14.pms" +date = "2021-05-26" + +[[notices]] +name = "FreeBSD-EN-21:13.mpt" +date = "2021-05-26" + +[[notices]] +name = "FreeBSD-EN-21:12.divert" +date = "2021-05-26" + +[[notices]] +name = "FreeBSD-EN-21:11.aesni" +date = "2021-05-26" + [[notices]] name = "FreeBSD-EN-21:10.lldb" date = "2021-04-06" diff --git a/website/static/security/advisories/FreeBSD-EN-21:11.aesni.asc b/website/static/security/advisories/FreeBSD-EN-21:11.aesni.asc new file mode 100644 index 0000000000..484758e445 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:11.aesni.asc @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:11.aesni Errata Notice + The FreeBSD Project + +Topic: Race condition in aesni(4) encrypt-then-auth operations + +Category: core +Module: aesni +Announced: 2021-05-26 +Affects: FreeBSD 12.2 +Corrected: 2021-04-27 19:16:35 UTC (stable/12, 12.2-STABLE) + 2021-05-26 20:40:11 UTC (releng/12.2, 12.2-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +The aesni(4) driver provides implementations of various cryptographic +operations using specialized CPU instructions available on contemporary Intel +and AMD CPUs. This provides improved throughput relative to pure software +implementations of the same operations. + +II. Problem Description + +aesni(4) implements SHA-1 and SHA-2 and can compute HMACs using these +functions. One step of the HMAC computation involves the computation of a +derived key. This step was implemented such that if multiple threads were +concurrently computing an HMAC using the same crypto(9) session, the kernel's +copy of the session key could be corrupted. + +III. Impact + +This bug could cause aesni(4) to return incorrect digests of input data, +or incorrect report a digest verification failure. + +Since the bug is only triggered when multiple threads are sharing a crypto(9) +session, some consumers are unaffected. For example, geli(8) will not trigger +the bug. It is possible to trigger the bug with IPSec or KGSSAPI, or via +crypto(4) if the underlying application is multithreaded and shares sessions +among multiple threads. + +IV. Workaround + +The aesni(4) kernel module may be unloaded to work around the problem. Note +that this may incur a substantial hit to performance. + +Workloads not making use of HMAC-based authentication using aesni(4) are +unaffected. For example, aesni(4) implements AES-GCM, and that implementation +is not susceptible to this problem. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an erratum update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-21:11/aesni.patch +# fetch https://security.FreeBSD.org/patches/EN-21:11/aesni.patch.asc +# gpg --verify aesni.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected by the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/12/ r369665 +releng/12.2/ r369860 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a particular +revision, replacing NNNNNN with the revision number: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251462> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:11.aesni.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6t4ACgkQ05eS9J6n +5cJdUBAAor2SfwygnujBNtepn8miqhACwa2P/8HZo1G68JTrHzRp8U8l/iLhTIwn +FF/aylaIg3uiFkb5V68yi9YKo4a8kIK0U/J805n8WUFFTS5OiwLkI3mLKC3vHMUD +d2gvBaAjPeBNjlNanFp8WpdNsCXvJq9CBXECQnwsnNJ1zpSSsTwm/T48pIeRpk/T +sYpyaLgEjsXl0tx0VkW2wwk7tNSQx0K7BouzqrwbQku18GW9ybETfQh5NE+Mz2+S +T1e3A4y2VNWXpDqCgHwl7+X7NX3FH2wGI56G3Xv781zJY5jq+UjxoXyLGVY56y3P +KvCgqnPavLZgER3ui/bqro3DR3uN6P3hb/Jg/3ChrNVuf9U0hElblWzQ3KQ/y2J8 +21YSuVvclMu4cfWfGcOYA8uXBQCUUYHAMKzenzmj9kZYMWaSZHpn/aibaYWZEO/U +hsDfeJRbR1hIVOdKGUmGrcWc2BVAQw/xHyAIn1IEBvCO9JRl09VPLNU6q19mrquH +GoQ0NRaWg6v+spHJeuiv3wreLjr/mfznk+I4Cz/CT3cVbm7b4gJXerObIWKnEyFI +Cj8ySvkhFAVdWcLIOJPrlIgxY5IoVr/raRuKhJ7kmFkELfUd1HK81e9QdpdzKYOH +hKWROGEBMr6bG17rqMY+tZmlx6wKVtf8mJCQHomQSi3Q7J2DRO0= +=KdoV +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-21:12.divert.asc b/website/static/security/advisories/FreeBSD-EN-21:12.divert.asc new file mode 100644 index 0000000000..c7ac1ce64e --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:12.divert.asc @@ -0,0 +1,130 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:12.divert Errata Notice + The FreeBSD Project + +Topic: Kernel double free when transmitting on a divert socket + +Category: core +Module: divert(4) +Announced: 2021-05-26 +Affects: FreeBSD 13.0 +Corrected: 2021-05-10 13:36:08 UTC (stable/13, 13.0-STABLE) + 2021-05-26 19:30:51 UTC (releng/13.0, 13.0-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +divert(4) sockets are a facility that permit firewalls to transmit a +copy of a packet to a userspace process. They may also be used by +userspace programs to inject packets into the IP packet processing +stack. In the FreeBSD base system, the only user of divert(4) sockets +is natd(8). + +II. Problem Description + +A bug in the error handling of transmission on a divert(4) socket could +result in a double free of an mbuf. + +III. Impact + +Systems making use of divert(4) may misbehave or panic in a +non-deterministic manner. + +IV. Workaround + +No workaround is available. Systems not making use of divert(4) sockets +are unaffected. divert(4) sockets appear in sockstat(8) output as using +protocol "div". + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an erratum update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-21:12/divert.patch +# fetch https://security.FreeBSD.org/patches/EN-21:12/divert.patch.asc +# gpg --verify divert.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected by the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ eafeee082c50 stable/13-n245578 +releng/13.0/ 22b58630d6ba releng/13.0-n244737 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255104> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:12.divert.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6usACgkQ05eS9J6n +5cJ/mw//SPzrCBbMJBWgwhQiJpI50BRgXWBFneThy2f5+2LWsg5gh1OJjqhqk+s9 +6PAHxujsUM15zAUQhwv5g+Z6g1l9j2Zy4kPsCN/QJR1zL51zqabOdOnqmAOom6gQ +nbXS2Fsh43dqCx3S+uEviC7U62kbU7CRXAhCI3wsHwRAyvzuXcUWizazp1hYllDE +IZ5LqJG/t9ZrMgMd3KabCoIVHFgPANZaBpSSFPhnDZxz7mvGVN4XtX2RYOht9f2B +xN05YSwmSLcB8EE1TQmjgcD6/K3hrPvkeFC0qSe9F66SJakuX19vfiWF2mrN/SO1 +fIILHtCaHcs2IWVzKK4FG01t3r3o7TkAnux+R4T7aMMh8LGbYiGtYCrlzaIN45aZ +bEA4aNqpZl1J1DtnthTnhNsd3R6Cq7f/hjtGNxYrSp6QLECPb4FhqVUig7m3p0s4 +a3Y5m3govOnTaRppmSt7aoXGd/yQDDc4YfIbqkWa/z3IabbW+cVUH5+uexmdLy+y +WJl/sNqznQPKPGDtPq39Ez1Pt6+TsOAowG4TXbNmaIk8C00KjFWnr+XcNS4GAhnd +QK+B2N9TQpBTSgwVMhDnjNIptEjE75VmpW3yAlQt6FL1DlVcAgZ5dgVeGHHPI+NZ +ONMpO+ifh/sRUDLH4QMviMoNi23ngkFdjo1Cq10DrIrxP4wDh6E= +=yWIx +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-21:13.mpt.asc b/website/static/security/advisories/FreeBSD-EN-21:13.mpt.asc new file mode 100644 index 0000000000..e91db4a244 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:13.mpt.asc @@ -0,0 +1,125 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:13.mpt Errata Notice + The FreeBSD Project + +Topic: mpt(4) I/O errors with a large maxphys value + +Category: core +Module: mpt +Announced: 2021-05-26 +Affects: FreeBSD 13.0 +Corrected: 2021-04-24 00:43:14 UTC (stable/13, 13.0-STABLE) + 2021-05-26 19:29:54 UTC (releng/13.0, 13.0-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +mpt(4) is a driver for LSI disk controllers. + +II. Problem Description + +The mpt(4) driver did not correctly handle I/O requests larger than or +equal to 2MB and would incorrectly report errors. The I/O request size +is limited by the value of the kern.maxphys tunable and the default +value is below this threshold. + +III. Impact + +With kern.maxphys set to 2MB or larger, I/O to mpt(4) devices will not +work correctly. + +IV. Workaround + +To work around the problem, ensure that the kern.maxphys value is kept +at its default value. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an erratum update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-21:13/mpt.patch +# fetch https://security.FreeBSD.org/patches/EN-21:13/mpt.patch.asc +# gpg --verify mpt.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected by the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ f0077b4c1dcf stable/13-n245384 +releng/13.0/ a8a91efa74e0 releng/13.0-n244734 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:13.mpt.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6uwACgkQ05eS9J6n +5cJB6A//bXZXr5CaQJeZYCt88W4EXHaf9vZSLE0p3umoNE2V7bXFsfKPN+mQJKmB +KFOHD8PZstnG0MX4D30t8gzxeLaadO3XhzifE8bRCa49Xiibdg0eL/XqQWylyVkm +Qpyi4QIqmfPijNVFFf9FFv+1I+ERhF66isqzcWravucZZn+nV26eKaPBSPzRv7pz +qbDxW3JHXNZOo6qJJiN71mPwlOleiY4ZcIsR1iz0uf2Uo7qu69YyecPkDnj0lbxT +2CrH2JV7sLXRkAHn9gujk50nu4iyUkWFsgo7dQZ34yEFXqicQMMAkiFpVadJvFgz +FXcLVBbKCuuI0yr5vV6/jms36FQVBtWlZGJx/BKg5jGhj8deSireP4BsyttfWdQA +6zLGtyKghFAmG9o9XCzOtast9LUd0ggK3RIe4GzxImWe2mWAnQPEp7QQD0sqmYzW +XDzF5rwHzdYDTtnp+fQ9rLKhKsunMwk3tCslnb3sO4Ai2bXm+wjV4t6nresmAZDT +fJlKU8XyIhzHy33rUe1JGhv+iuNbORA7dS07XYrB70T80HOFMNo1vOy4NE2A41TJ +plPXCjIdOZBkZsmy16uYLMnljRzYgBLejr/4QnSbKxEtUGJiog8osnGnFC6wCzgy +XyscM8G2tL6jvmAVuKDLDiiBRZtc7ZEGHGjTpABLccPOmbcq4fk= +=Ch28 +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-21:14.pms.asc b/website/static/security/advisories/FreeBSD-EN-21:14.pms.asc new file mode 100644 index 0000000000..db520ea5ad --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:14.pms.asc @@ -0,0 +1,151 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:14.pms Errata Notice + The FreeBSD Project + +Topic: pms(4) data corruption + +Category: core +Module: pms +Announced: 2021-05-26 +Affects: FreeBSD 12.2 and later. +Corrected: 2021-04-23 01:05:42 UTC (stable/13, 13.0-STABLE) + 2021-05-26 19:30:23 UTC (releng/13.0, 13.0-RELEASE-p1) + 2021-04-23 01:11:07 UTC (stable/12, 12.2-STABLE) + 2021-05-26 20:40:15 UTC (releng/12.2, 12.2-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +pms(4) is a driver for PMC-Sierra disk controllers. + +II. Problem Description + +Two problems are fixed by this update. + +First, the pms(4) driver did not correctly handle the new kern.maxphys +value set in FreeBSD 13.0. The devices supported by the driver impose a +limit on the maximum I/O size, and this limit is smaller than the new +default. + +Second, the pms(4) driver did not correctly handle some error cases in +the I/O path and would falsely report success to upper layers. + +III. Impact + +The bugs may cause data corruption. + +IV. Workaround + +No workaround is available. Systems not using pms(4) are unaffected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an erratum update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 13.0] +# fetch https://security.FreeBSD.org/patches/EN-21:14/pms.13.patch +# fetch https://security.FreeBSD.org/patches/EN-21:14/pms.13.patch.asc +# gpg --verify pms.13.patch.asc + +[FreeBSD 12.2] +# fetch https://security.FreeBSD.org/patches/EN-21:14/pms.12.patch +# fetch https://security.FreeBSD.org/patches/EN-21:14/pms.12.patch.asc +# gpg --verify pms.12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected by the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ 6514cb18d94e stable/13-n245322 +releng/13.0/ b62d492067ba releng/13.0-n244736 +stable/12/ r369655 +releng/12.2/ r369861 +- ------------------------------------------------------------------------- + +For FreeBSD 13 and later: + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +For FreeBSD 12 and earlier: + +Run the following command to see which files were modified by a particular +revision, replacing NNNNNN with the revision number: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:14.pms.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6uwACgkQ05eS9J6n +5cJZWg/8DEsOaseewourLWezA+HeV2aHfsNf96qa4O7oAOUGtCm7nKi7jodIiLB1 +DiX8YqskrVav36lLxgyQazSCF84xB1YsNP4EiOzjeIoZyirR8+KiG37CunGhUDPg +8mPCE1+WBzHlcDwAEexldi+b88ehEqADbZiGWAsBcXYqhwaXoF6zUkgp5WFRWKzu +Kiq7Wjs7FGkAp38O4UKduybpubSyUjHCeShEGyZvevJQE4kAZKzv1+Q+spUeIBLP +P99p+vidIFIpX4uq0GgjF1GLuz4ym1tRZwu4jlJ0Vhr0KjqTWwxoMZ0m+0+SwKit +dqPLQ/rj1vBiCScU7rIS49wfT6vtujH9gPt4GI5mTY8++4hDkfRvS4D5we9RgIo+ +0j3NIAf0cb47V6nPSOBwAqkFwjtGu7rhtGgmmp1Pmf0v8I/EqRCgIekexMVW294u +L9pyH3LalHqi/GcuMn8emTPiJ6+5a1e+EBKXtnoX5tJvenkSXAl6eV7BuETaaMOc +zvMheSzvcnn+h2jIA1Mizfv9BIglRNakIxzJpSxugQWTzAQ7PutzqSaLCsn9byp3 +590cBmbmVdAFEuqIdz5I/d3BwpF24myNmYFtRlxT115jaOV8ta2qKg4GryMOCUL2 +R+zE2+d1JT+/Ra1wm2vfWIUb1pPQUIIvQ8m2rGhiok0Nlc7C7O0= +=nfsk +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-21:15.virtio.asc b/website/static/security/advisories/FreeBSD-EN-21:15.virtio.asc new file mode 100644 index 0000000000..45bff06182 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:15.virtio.asc @@ -0,0 +1,125 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:15.virtio Errata Notice + The FreeBSD Project + +Topic: virtio(4) device probing fails + +Category: core +Module: virtio +Announced: 2021-05-26 +Affects: FreeBSD 13.0 +Corrected: 2021-04-03 06:09:50 UTC (stable/13, 13.0-STABLE) + 2021-05-26 20:32:40 UTC (releng/13.0, 13.0-RELEASE-p1) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +VirtIO is a specification for para-virtualized I/O in a virtual machine +(VM). It defines an interface for efficient I/O between the hypervisor +and VM. + +II. Problem Description + +The virtio(4) driver on FreeBSD implemented support of the legacy +interface, which was released before the specification was formalized, +requiring certain characteristics that were different on some VMM +implementations. + +III. Impact + +FreeBSD will not boot on certain VMM implementations. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an erratum update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-21:15/virtio.patch +# fetch https://security.FreeBSD.org/patches/EN-21:15/virtio.patch.asc +# gpg --verify virtio.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +This issue is corrected by the corresponding Git commit hash or Subversion +revision number in the following stable and release branches: + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ 2e107638eac2 stable/13-n245094 +releng/13.0/ 61acb3179a90 releng/13.0-n244741 +- ------------------------------------------------------------------------- + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:15.virtio.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6uwACgkQ05eS9J6n +5cLlmA/5AR5G9Ifb34fJVhj4PT4rUiSj41mbdECbNKTgdPD2zBkedAI9Nc4w2xcG ++/i7hhePMCe8jfIwgw6eWW3UlJWx9XAtR0r/HsPxUt+glopPNcK9xr2OSY2h/jSo +EkFE3JdhTvSwapIH4VNku1PULXXMQWxI3E5Ccd4mEFz/uchq7Q83koE136M2UyXR +XXk9AsxmuNrG/dlWi5MhbUuljqkXY2O160ErIrNivHiOVHIxtiX/snEX6Q4srE2Q +YmdAC07p64xB+3c2ZkFrA/4Khp/XRO8wRwbNE8FhGiVUwlYL2a/BB1Ldq84UbdOl +ISEPr564SfhV2bSFs7PM6iHRXdD46K0/7O42X6ZswIhwN1IN+mkTW/LkYdPMpLn2 +S7lmV9ulgOBkAqHQ//+7gcOMPerNXwZ0Rcnf8SY8aOqOkgIVIXG0XocOl/nBJ9CZ +Syq7vuFly9EijTYtLonNv3XtTjB9Z5UjwBJPnmNGS6JYgbJQVpjllchLkb+cv5Kt +jVnC5YiuOAaNJ8XjqfjhyHXZrSkVmdYINRohn1y2tojNkn3jRMCYJMB0EvIugCqU +oCKmMn8R3m87723ylm5CykXmxgkSR3rfsvwzvioEFojcC+sgB5H5tdcP0XLvqg52 +DP9Rnq+j0YfNs/Ud+dcIpI4/7ANduVu+WKsd58w+H3lPmkrP9aE= +=Cr4I +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-EN-21:16.bc.asc b/website/static/security/advisories/FreeBSD-EN-21:16.bc.asc new file mode 100644 index 0000000000..01233d766c --- /dev/null +++ b/website/static/security/advisories/FreeBSD-EN-21:16.bc.asc @@ -0,0 +1,160 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-21:16.bc Errata Notice + The FreeBSD Project + +Topic: dc update + +Category: contrib +Module: bc +Announced: 2021-05-26 +Affects: FreeBSD 13.0 + FreeBSD 12.2 (only when built with option WITH_GH_BC) +Corrected: 2021-04-06 08:44:52 UTC (stable/13, 13.0-STABLE) + 2021-05-26 20:32:40 UTC (releng/13.0, 13.0-RELEASE-p1) + 2021-04-06 08:44:52 UTC (stable/12, 12.2-STABLE) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +<URL:https://security.FreeBSD.org/>. + +I. Background + +The program dc provides a simple stack-based programming language that uses +a reverse Polish notation. Although it is a fully functional language, it +has been used primarily as a computational engine by the program bc, which +implements a more traditional language based on infix notation of operands. + +In FreeBSD 13.0 and in custom builds of FreeBSD 12.2-STABLE (with the +non-default option WITH_GH_BC) the traditional implementations of bc and dc +have been replaced by a single program under both names that provides better +POSIX conformance of the bc language, compatibility with GNU bc extensions, +and significantly improved performance of big number calculations. + +II. Problem Description + +The "P" command of the dc language outputs the top-of-stack value and should +consume it, but in this version leaves it on the stack. This problem only +affects direct dc command scripts that use "P" and rely on its effect on the +stack (i.e., do not terminate after this command and have references to stack +elements that are hidden by the value that has not been removed). + +III. Impact + +Since dc has been used very little as a general purpose programming language, +only a very small number of dc scripts exist, and most of them are used to +describe the language for educational purposes only. This issue has existed +in this implementation of dc for at least 3 years without having been +noticed. + +If a dc script relies on the correct semantics of a "P" instruction, it will +not execute subsequent instructions correctly, which may result in incorrect +output or in an infinite loop. + +IV. Workaround + +The math/gh-bc port and the gh-bc package have been updated to correct the +issue and are fully compatible with this version in all other aspects. + +They can be installed in addition to the base system versions of bc and +dc but may require a change of scripts that use dc to invoke the version +installed below LOCALBASE. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the amd64, i386, or +(on FreeBSD 13 and later) arm64 platforms can be updated via the +freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-21:16/bc.patch +# fetch https://security.FreeBSD.org/patches/EN-21:16/bc.patch.asc +# gpg --verify bc.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Hash Revision +- ------------------------------------------------------------------------- +stable/13/ 0ca6ce5e976a stable/13-n245186 +releng/13.0/ 312510880e2e releng/13.0-n244742 +stable/12/ r369589 +- ------------------------------------------------------------------------- + +For FreeBSD 13 and later: + +Run the following command to see which files were modified by a +particular commit: + +# git show --stat <commit hash> + +Or visit the following URL, replacing NNNNNN with the hash: + +<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN> + +To determine the commit count in a working tree (for comparison against +nNNNNNN in the table above), run: + +# git rev-list --count --first-parent HEAD + +For FreeBSD 12 and earlier: + +Run the following command to see which files were modified by a particular +revision, replacing NNNNNN with the revision number: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-21:16.bc.asc> +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmCu6u0ACgkQ05eS9J6n +5cK2Ww//Th4xtnGjvJ/GSGUq+eLMDPLJzUJhRI0jgjDVqI8tL5JMyxcui1oR0/Ur ++0GvR7JSYJ+WYLLIMHwnP3DYzyHp7ICRhCJoykwa4yKVpcdLcvX0R8Nm+2/fBC02 +PDFAvnO4HVdOJdqM5rNzA4/Y150HYj30bDXrry0RKaHKYDgp6SVc9+2T7o5zHJSX +x49TiHSVwHCjvnauIFqqFldTz1eGUMMxlisyxD9sP6efkYS49C/25O/xhwdqmrtx +HvhTdFsOr0FgPsMUSvLVcuYJOcW+/1Q+5CM/rjMyQ1VkdP/5UqFGoXHfZuiTvrRY +9pXjymwk1MyUYzEn3vu7B1ZDqJptZ4DRok4La/ylOlVVWq2hUKYtJUQja9u9O2wt +YjBvdAF/wjkr3t93qwsoWwiTP3tuPADtccfQ18rSNmN12405hAVKfLvvGDQ/mTZn +lnDHOpMQXMvuChYdf2VYOX67S7yhxV4+ThrEJkopcdCOOxYRN8A6ePmPyVg+HqHw +WcAGWWPZjm/o0r2SKJi5SM6cwJUMOQAF/hVw02NiK2uY5aXuZlIVDPgHR/LfoDce +juLKfBWAw3om7nPOF7dDXkJDN/HZ03IQM6DOStK7zvytCctxNq2+eVgSb4g/3yvs +mpvGMP1DLQywSOvmp00B8mLws9rcQbe8rUI6rR2hb9kMCcfTHIU= +=MITo +-----END PGP SIGNATURE----- diff --git a/website/static/security/advisories/FreeBSD-SA-21:11.smap.asc b/website/static/security/advisories/FreeBSD-SA-21:11.smap.asc new file mode 100644 index 0000000000..22afada9c9 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-SA-21:11.smap.asc @@ -0,0 +1,167 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-21:11.smap Security Advisory + The FreeBSD Project + +Topic: SMAP bypass + +Category: core +Module: amd64 +Announced: 2021-05-26 +Credits: I lost my dog if you see him please contact me at @m00nbsd. +Affects: FreeBSD 12.2 and later. +Corrected: 2021-05-26 19:18:54 UTC (stable/13, 13.0-STABLE) + 2021-05-26 19:31:50 UTC (releng/13.0, 13.0-RELEASE-p1) + 2021-05-26 19:30:31 UTC (stable/12, 12.2-STABLE) + 2021-05-26 20:40:20 UTC (releng/12.2, 12.2-RELEASE-p7) *** 1494 LINES SKIPPED ***
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202105270047.14R0l7BZ086882>