Date: Wed, 27 Jan 2016 08:09:32 +0000 (UTC) From: Xin LI <delphij@FreeBSD.org> To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r48099 - in head/share: security/advisories security/patches/SA-16:08 security/patches/SA-16:09 security/patches/SA-16:10 xml Message-ID: <201601270809.u0R89Wff063380@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: delphij Date: Wed Jan 27 08:09:32 2016 New Revision: 48099 URL: https://svnweb.freebsd.org/changeset/doc/48099 Log: Add SA-16:08, SA-16:09 and SA-16:10. Added: head/share/security/advisories/FreeBSD-SA-16:08.bind.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-16:09.ntp.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-16:10.linux.asc (contents, props changed) head/share/security/patches/SA-16:08/ head/share/security/patches/SA-16:08/bind.patch (contents, props changed) head/share/security/patches/SA-16:08/bind.patch.asc (contents, props changed) head/share/security/patches/SA-16:09/ head/share/security/patches/SA-16:09/ntp.patch (contents, props changed) head/share/security/patches/SA-16:09/ntp.patch.asc (contents, props changed) head/share/security/patches/SA-16:10/ head/share/security/patches/SA-16:10/linux.patch (contents, props changed) head/share/security/patches/SA-16:10/linux.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml Added: head/share/security/advisories/FreeBSD-SA-16:08.bind.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:08.bind.asc Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,145 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:08.bind Security Advisory + The FreeBSD Project + +Topic: BIND remote denial of service vulnerability + +Category: contrib +Module: bind +Announced: 2016-01-27 +Credits: ISC +Affects: FreeBSD 9.x +Corrected: 2016-01-20 08:54:35 UTC (stable/9, 9.3-STABLE) + 2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35) +CVE Name: CVE-2015-8704 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +BIND 9 is an implementation of the Domain Name System (DNS) protocols. +The named(8) daemon is an Internet Domain Name Server. + +Address Prefixes List (APL RR) is a type of DNS Resource Record defined in +RFC 3123. + +II. Problem Description + +There is an off-by-one error in a buffer size check when performing certain +string formatting operations. + +III. Impact + +Slaves using text-format db files could be vulnerable if receiving a +malformed record in a zone transfer from their master. + +Masters using text-format db files could be vulnerable if they accept +a malformed record in a DDNS update message. + +Recursive resolvers are potentially vulnerable when debug logging is +enabled and if they are fed a deliberately malformed record by a +malicious server. + +A server which has cached a specially constructed record could encounter +this condition while performing 'rndc dumpdb'. + +IV. Workaround + +No workaround is available, but hosts not running named(8) are not +vulnerable. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +The named service has to be restarted after the update. A reboot is +recommended but not required. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +The named service has to be restarted after the update. A reboot is +recommended but not required. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 9.3] +# fetch https://security.FreeBSD.org/patches/SA-16:08/bind.patch +# fetch https://security.FreeBSD.org/patches/SA-16:08/bind.patch.asc +# gpg --verify bind.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r294405 +releng/9.3/ r294905 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://kb.isc.org/article/AA-01335> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:08.bind.asc> +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.8 (FreeBSD) + +iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rngIkP/Ru1a5U14/iJKqGO2o+OQkk5 +j9G3rwEQROlPhtHdUE3vtA2fZcsayJaK1CjU3j91VWlTXHfBnju6gbJVPntNQqe5 +TxRFmRhRjcyreNdt6hKvFgDrXmWwrytRukJ/XafdYxoWFDTtrUScwrOH87U8ILcF +gkWgzCQ7EnYqr7sEW1makDHmIOLukJo5pJOnUTRkraDP2oaKSros3GC+Fnh6Wf+q +wYOkgl2gj96ubJW4SvdZCAKFtnMrhw0ZZyrVDuPojzWU+ZotzWvZz3xGvoSqXy5U +rqqtUQNHMU0Aqhe9zurW4B2ioff6XALZPgRYqQRI8ezXTgDDhJSwa12mjTJuQmaR +hQRJlW5u5/Ejj2NML6NkhvLuSApwZcAZ2G7cLGdR6nEKKVEb6mXgnL7T/CdhhTj8 +2owIz1iIdI2sUmhv6vuxPxB1k/O7b76LTZ2AL6jx4/mEtOVeofpNej5w7qnvCSqV +RcZsOYRXrMZ0YWuhBkKqnMGGIU0TBMDvjJL5gxf5RR14iLExcC1fKhkhbvRMag4Y +ck7Ja45Ltpwtd0t7/AfzbeI4OVmos4NB36HK5pYJchmOUavm6im5V6781mYGZgQn +HtOQEyi7tSeft+Fz21dmK6Z1GV6lRmrt52wAKyJ71nA/WESgma50WE49RX+cH1MH +nmon5PYKLuMuzFVNYZWs +=HYpu +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-16:09.ntp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:09.ntp.asc Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,225 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:09.ntp Security Advisory + The FreeBSD Project + +Topic: Multiple vulnerabilities of ntp + +Category: contrib +Module: ntp +Announced: 2016-01-27 +Credits: Cisco ASIG / Network Time Foundation +Affects: All supported versions of FreeBSD. +Corrected: 2016-01-22 15:55:21 UTC (stable/10, 10.2-STABLE) + 2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11) + 2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28) + 2016-01-22 15:56:35 UTC (stable/9, 9.3-STABLE) + 2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35) +CVE Name: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, + CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, + CVE-2015-8139, CVE-2015-8140, CVE-2015-8158 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The ntpd(8) daemon is an implementation of the Network Time Protocol (NTP) +used to synchronize the time of a computer system to a reference time +source. + +II. Problem Description + +Multiple vulnerabilities have been discovered in ntp 4.2.8p5: + +Potential Infinite Loop in ntpq. [CVE-2015-8158] + +A logic error would allow packets with an origin timestamp of zero +to bypass this check whenever there is not an outstanding request +to the server. [CVE-2015-8138] + +Off-path Denial of Service (DoS) attack on authenticated broadcast mode. +[CVE-2015-7979] + +Stack exhaustion in recursive traversal of restriction list. [CVE-2015-7978] + +reslist NULL pointer dereference. [CVE-2015-7977] + +ntpq saveconfig command allows dangerous characters in filenames. +[CVE-2015-7976] + +nextvar() missing length check. [CVE-2015-7975] + +Skeleton Key: Missing key check allows impersonation between authenticated +peers. [CVE-2015-7974] + +Deja Vu: Replay attack on authenticated broadcast mode. [CVE-2015-7973] + +ntpq vulnerable to replay attacks. [CVE-2015-8140] + +Origin Leak: ntpq and ntpdc, disclose origin. [CVE-2015-8139] + +III. Impact + +A malicious NTP server, or an attacker who can conduct MITM attack by +intercepting NTP query traffic, may be able to cause a ntpq client to +infinitely loop. [CVE-2015-8158] + +A malicious NTP server, or an attacker who can conduct MITM attack by +intercepting NTP query traffic, may be able to prevent a ntpd(8) daemon +to distinguish between legitimate peer responses from forgeries. This +can partially be mitigated by configuring multiple time sources. +[CVE-2015-8138] + +An off-path attacker who can send broadcast packets with bad +authentication (wrong key, mismatched key, incorrect MAC, etc) to +broadcast clients can cause these clients to tear down associations. +[CVE-2015-7979] + +An attacker who can send unauthenticated 'reslist' command to a NTP +server may cause it to crash, resulting in a denial of service +condition due to stack exhaustion [CVE-2015-7978] or a NULL pointer +dereference [CVE-2015-7977]. + +An attacker who can send 'modify' requests to a NTP server may be +able to create file that contain dangerous characters in their name, +which could cause dangerous behavior in a later shell invocation. +[CVE-2015-7976] + +A remote attacker may be able to crash a ntpq client. [CVE-2015-7975] + +A malicious server which holds a trusted key may be able to +impersonate other trusted servers in an authenticated configuration. +[CVE-2015-7974] + +A man-in-the-middle attacker or a malicious participant that has the +same trusted keys as the victim can replay time packets if the NTP +network is configured for broadcast operations. [CVE-2015-7973] + +The ntpq protocol is vulnerable to replay attacks which may be used +to e.g. re-establish an association to malicious server. [CVE-2015-8140] + +An attacker who can intercept NTP traffic can easily forge live server +responses. [CVE-2015-8139] + +IV. Workaround + +No workaround is available, but systems not running ntpd(8) are not +affected. Network administrators are advised to implement BCP-38, +which helps to reduce risk associated with the attacks. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +The ntpd service has to be restarted after the update. A reboot is +recommended but not required. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +The ntpd service has to be restarted after the update. A reboot is +recommended but not required. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch +# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch.asc +# gpg --verify ntp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r294570 +releng/9.3/ r294905 +stable/10/ r294569 +releng/10.1/ r294904 +releng/10.2/ r294904 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7973> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7974> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7975> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7976> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7977> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7978> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-7979> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8138> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8139> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8140> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?CVE-2015-8158> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc> +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.8 (FreeBSD) + +iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rnt9cP/2EtdEPX/oBJXKFWqQv5cwvY +C4gmlK5MZok2an330XMPl0RO2RplsIw4Lo4BuUh7HPKhVa5loYasabKrULQ+4Pgv +z9INxDTDO8iooHeTeNe/VAb5YcKFrD7sqajdc0cY11rLEw1o53IuULz9wZnczAe/ +KnHDNUyYaSU2Ep+c3+ADSJqOk3ffhsGDS+0byoOBcUN+66MnBg19/rKomiN5a7Nt +XSseoQgYISU8aaJDvPlGoaN/Xm5fnFZaKFlJ4y7h51sYYep0qgjQx+Gdakk0vNbh +CwsjpBKqDpFpBcSgdEC/bYHnNpYUTJB/tPmG3YDO5jMWQISKGrrnuMYeh+7PjTDS +vCrneztpVBscLG4ZKSlfmhpZ/Jfy31YPXm5P/w8NuA05i13K06P4gG5PKNyUMgsk +AZQ4Vg8YlyS0Ci4ufdc+AIQI35QMrKvfecJVu49+sNhUA4PpTe7coEU9dks3Dtaw +g2QbfnsEWzJ6RBJcw7aQDSgRoqrVQgMB8IIota+aMzeVurgyFxPm9LASk2RYjhmC +Ep283cc+HPUnihKBZTwwkw5iznbmpyRYlPghEc7slgOZCbk9pefnsCMOZAqRW9fZ +DUpt+HvZD5BKB4kCAUMIvKGS91cyBFaNcdJhlB8uUx2aP2UJmuzldk+x9K74wWGK +lnP0IazzXnWFobfwr+qT +=0ZhD +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-16:10.linux.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:10.linux.asc Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,140 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:10.linux Security Advisory + The FreeBSD Project + +Topic: Linux compatibility layer issetugid(2) system call + vulnerability + +Category: core +Module: kernel +Announced: 2016-01-27 +Credits: Isaac Dunham, Brent Cook, Warner Losh +Affects: All supported versions of FreeBSD. +Corrected: 2016-01-27 07:28:55 UTC (stable/10, 10.2-STABLE) + 2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11) + 2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28) + 2016-01-27 07:34:23 UTC (stable/9, 9.3-STABLE) + 2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35) +CVE Name: CVE-2016-1883 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +FreeBSD is binary-compatible with the Linux operating system through a +loadable kernel module/optional kernel component. The support is +provided on amd64 and i386 machines. + +II. Problem Description + +A programming error in the Linux compatibility layer could cause the +issetugid(2) system call to return incorrect information. + +III. Impact + +If an application relies on output of the issetugid(2) system call +and that information is incorrect, this could lead to a privilege +escalation. + +IV. Workaround + +No workaround is available, but systems not using the Linux binary +compatibility layer are not vulnerable. + +The following command can be used to test if the Linux binary +compatibility layer is loaded: + +# kldstat -m linuxelf + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Reboot the system or unload and reload the linux.ko kernel module. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +Reboot the system or unload and reload the linux.ko kernel module. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-16:10/linux.patch +# fetch https://security.FreeBSD.org/patches/SA-16:10/linux.patch.asc +# gpg --verify linux.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in +<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r294903 +releng/9.3/ r294905 +stable/10/ r294901 +releng/10.1/ r294904 +releng/10.2/ r294904 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1883> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:10.linux.asc> +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.8 (FreeBSD) + +iQIcBAEBCgAGBQJWqHmfAAoJEO1n7NZdz2rnsr0QAJtM4C+IgRcRHdNGL7vXp1NP +u3sFyktcRGCR0p+lMOaFYPp/Vmu09NglhcaxYFbk4WONVSnZKOuiWsjOL9by/eof +77i8bXINlB/8Pp+34KpxDtz5wR3jVAApaL8xvS+/DaKj3RdQ63RrHgtQRTAk+VSO +ISAXxF2U/XAcRlmBQ3oOtqeHads6M1LNG/D/I0FgpU2G17QoUpfa+AvOkS1wBw7d +mdcnC4NDKKx3QnyD0FTrh4z444PwvE3IQ7OSm7VX4/oOZdH+CC9coLCV1BXALrfA +WVmaUMDy8bWiv7JMsda2xl4KhcEx2Y0UN2hGYdMZJubqYcnUknMimW3b2fhsfgl1 +UaQDD6xv9I4xZqo1NHh4/WiH33PvOmM+U0E6IMb5hTUbfSd0mXOn4yzTP5gJxe4h +fPk5ZUj/HTKx6C8ERMknTDdn+ZrLLlQJAoDbipPZkRBMcsgvRYGjKquBnrW9N0z2 +BUtuLODg/GxMmkQXYV7mT08xw7YLvIbfSwGvlOd/k5hB/0KMTRLBFGd6vc2lZ+CL +dseeK59vUK50Arua8qbg6AlOYc9Dga/XeQ753za0zEm7LOXzjr7jlBex/04ZxvE/ +N4OTxNYlASk1cwBcoytZ8da3D7Vqh7vw7QmUR8lAb/x5ijR1QjCApji+yRupCEG+ +PGHIMcxSGeBx7Drd1eBE +=PyM5 +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:08/bind.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:08/bind.patch Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,22 @@ +Index: contrib/bind9/lib/dns/rdata/in_1/apl_42.c +=================================================================== +--- contrib/bind9/lib/dns/rdata/in_1/apl_42.c (revision 294299) ++++ contrib/bind9/lib/dns/rdata/in_1/apl_42.c (working copy) +@@ -116,7 +116,7 @@ totext_in_apl(ARGS_TOTEXT) { + isc_uint8_t len; + isc_boolean_t neg; + unsigned char buf[16]; +- char txt[sizeof(" !64000")]; ++ char txt[sizeof(" !64000:")]; + const char *sep = ""; + int n; + +@@ -140,7 +140,7 @@ totext_in_apl(ARGS_TOTEXT) { + isc_region_consume(&sr, 1); + INSIST(len <= sr.length); + n = snprintf(txt, sizeof(txt), "%s%s%u:", sep, +- neg ? "!": "", afi); ++ neg ? "!" : "", afi); + INSIST(n < (int)sizeof(txt)); + RETERR(str_totext(txt, target)); + switch (afi) { Added: head/share/security/patches/SA-16:08/bind.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:08/bind.patch.asc Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.8 (FreeBSD) + +iQIcBAABCgAGBQJWqHnkAAoJEO1n7NZdz2rnSzoQALduvw7DCOsGiKYoQgU17nyo +iiacv5vRmDx7+43BMsND1SM9kwid9RPZWbAj5lb80g7ZOnluBxAoilmqVWgzs9gb +1IkATsf5TTbQcGxYG1wQqx2ahfih0FUIb3Qg1KFMDO3XCPvIMucSAQMtPgq3FdFl +A/FGH1+Yls4Aum53ulgR6IuotzaYnxiznxqi5IGhfTrPSZIuVnH4SDubwTrE+0kJ +N3SzYc3ilguqOtxwSyBtIMSaqPiXZCBGYKGnR8RzysxhfdP56dBSJHzkNoniexjU +4jYD5X+fY6ze04yjgdh/Fat3IgoqjnJ3UJ//lxMWGBrj4xI9JHUAS/jLJpLPnMuI +WBL7G2jJXGrBsGwq5imDPuobfQoT8wuXYGfMi14XRc5/cKbQn+JqTGf9zB562NSW +ADe26s05zgvYS10+nhbxT7v3gYcB/0U2M6HGbN5t/KCTBGteJJsSo3o2ZEZBdkbe +jKnNP8RR2OTAjeCCXYqp8BVO9d+tecOzX/LM5Lj+97iwKKkPkHnOGA9zkyeQdGvt +8KxBsub1LRYPR/87WZDZWtdGALaxqgQDj7G1ib0mLCbj2CzOSRa34bS/kvTQ7BtD +ca7fhrebvhBVP6MqnYAmmuU+ojqMftx7mTZs+fWWFVLcTiPp9WqP2w0r6A/MlkSq +ys1rAAXCj/WvMFopSMzu +=kVrg +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:09/ntp.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:09/ntp.patch Wed Jan 27 08:09:32 2016 (r48099) @@ -0,0 +1,17352 @@ +Index: contrib/ntp/ChangeLog +=================================================================== +--- contrib/ntp/ChangeLog (revision 294707) ++++ contrib/ntp/ChangeLog (working copy) +@@ -1,4 +1,38 @@ + --- ++(4.2.8p6) 2016/01/20 Released by Harlan Stenn <stenn@ntp.org> ++ ++* [Sec 2935] Deja Vu: Replay attack on authenticated broadcast mode. HStenn. ++* [Sec 2936] Skeleton Key: Any trusted key system can serve time. HStenn. ++* [Sec 2937] ntpq: nextvar() missing length check. perlinger@ntp.org ++* [Sec 2938] ntpq saveconfig command allows dangerous characters ++ in filenames. perlinger@ntp.org ++* [Sec 2939] reslist NULL pointer dereference. perlinger@ntp.org ++* [Sec 2940] Stack exhaustion in recursive traversal of restriction ++ list. perlinger@ntp.org ++* [Sec 2942]: Off-path DoS attack on auth broadcast mode. HStenn. ++* [Sec 2945] Zero Origin Timestamp Bypass. perlinger@ntp.org ++* [Sec 2948] Potential Infinite Loop in ntpq ( and ntpdc) perlinger@ntp.org ++* [Bug 2772] adj_systime overflows tv_usec. perlinger@ntp.org ++* [Bug 2814] msyslog deadlock when signaled. perlinger@ntp.org ++ - applied patch by shenpeng11@huawei.com with minor adjustments ++* [Bug 2882] Look at ntp_request.c:list_peers_sum(). perlinger@ntp.org ++* [Bug 2891] Deadlock in deferred DNS lookup framework. perlinger@ntp.org ++* [Bug 2892] Several test cases assume IPv6 capabilities even when ++ IPv6 is disabled in the build. perlinger@ntp.org ++ - Found this already fixed, but validation led to cleanup actions. ++* [Bug 2905] DNS lookups broken. perlinger@ntp.org ++ - added limits to stack consumption, fixed some return code handling ++* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call ++ - changed stacked/nested handling of CTRL-C. perlinger@ntp.org ++ - make CTRL-C work for retrieval and printing od MRU list. perlinger@ntp.org ++* [Bug 2980] reduce number of warnings. perlinger@ntp.org ++ - integrated several patches from Havard Eidnes (he@uninett.no) ++* [Bug 2985] bogus calculation in authkeys.c perlinger@ntp.org ++ - implement 'auth_log2()' using integer bithack instead of float calculation ++* Make leapsec_query debug messages less verbose. Harlan Stenn. ++* Disable incomplete t-ntp_signd.c test. Harlan Stenn. ++ ++--- + (4.2.8p5) 2016/01/07 Released by Harlan Stenn <stenn@ntp.org> + + * [Sec 2956] small-step/big-step. Close the panic gate earlier. HStenn. +@@ -47,6 +81,7 @@ + lots of clients. perlinger@ntp.org + * [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call + - changed stacked/nested handling of CTRL-C. perlinger@ntp.org ++ - make CTRL-C work for retrieval and printing od MRU list. perlinger@ntp.org + * Unity cleanup for FreeBSD-6.4. Harlan Stenn. + * Unity test cleanup. Harlan Stenn. + * Libevent autoconf pthread fixes for FreeBSD-10. Harlan Stenn. +@@ -55,9 +90,8 @@ + * Quiet a warning from clang. Harlan Stenn. + * Update the NEWS file. Harlan Stenn. + * Update scripts/calc_tickadj/Makefile.am. Harlan Stenn. ++ + --- +-(4.2.8p4) 2015/10/21 Released by Harlan Stenn <stenn@ntp.org> +-(4.2.8p4-RC1) 2015/10/06 Released by Harlan Stenn <stenn@ntp.org> + + * [Sec 2899] CVE-2014-9297 perlinger@ntp.org + * [Sec 2901] Drop invalid packet before checking KoD. Check for all KoD's. +Index: contrib/ntp/CommitLog +=================================================================== +--- contrib/ntp/CommitLog (revision 294707) ++++ contrib/ntp/CommitLog (working copy) +@@ -1,8 +1,633 @@ +-ChangeSet@1.3623, 2016-01-07 23:33:11+00:00, stenn@deacon.udel.edu ++ChangeSet@1.3628, 2016-01-20 04:20:12-05:00, stenn@deacon.udel.edu ++ NTP_4_2_8P6 ++ TAG: NTP_4_2_8P6 ++ ++ ChangeLog@1.1793 +1 -0 ++ NTP_4_2_8P6 ++ ++ ntpd/invoke-ntp.conf.texi@1.196 +1 -1 ++ NTP_4_2_8P6 ++ ++ ntpd/invoke-ntp.keys.texi@1.188 +1 -1 ++ NTP_4_2_8P6 ++ ++ ntpd/invoke-ntpd.texi@1.504 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.conf.5man@1.230 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.conf.5mdoc@1.230 +2 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.conf.html@1.183 +60 -2 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.conf.man.in@1.230 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.conf.mdoc.in@1.230 +2 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.keys.5man@1.222 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.keys.5mdoc@1.222 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.keys.html@1.184 +21 -33 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.keys.man.in@1.222 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpd/ntp.keys.mdoc.in@1.222 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd-opts.c@1.526 +10 -10 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd-opts.h@1.525 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd.1ntpdman@1.333 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd.1ntpdmdoc@1.333 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd.html@1.177 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd.man.in@1.333 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpd/ntpd.mdoc.in@1.333 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpdc/invoke-ntpdc.texi@1.501 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc-opts.c@1.519 +10 -10 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc-opts.h@1.518 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc.1ntpdcman@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc.1ntpdcmdoc@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc.html@1.345 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc.man.in@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpdc/ntpdc.mdoc.in@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpq/invoke-ntpq.texi@1.508 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq-opts.c@1.525 +10 -10 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq-opts.h@1.523 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq.1ntpqman@1.336 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq.1ntpqmdoc@1.336 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq.html@1.174 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq.man.in@1.336 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpq/ntpq.mdoc.in@1.336 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/invoke-ntpsnmpd.texi@1.503 +2 -2 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd-opts.c@1.521 +10 -10 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd-opts.h@1.520 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd.1ntpsnmpdman@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd.1ntpsnmpdmdoc@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd.html@1.172 +1 -1 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd.man.in@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ ntpsnmpd/ntpsnmpd.mdoc.in@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ packageinfo.sh@1.524 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/calc_tickadj.1calc_tickadjman@1.93 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/calc_tickadj.1calc_tickadjmdoc@1.94 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/calc_tickadj.html@1.95 +1 -1 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/calc_tickadj.man.in@1.92 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/calc_tickadj.mdoc.in@1.94 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/calc_tickadj/invoke-calc_tickadj.texi@1.97 +1 -1 ++ NTP_4_2_8P6 ++ ++ scripts/invoke-plot_summary.texi@1.114 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/invoke-summary.texi@1.114 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/invoke-ntp-wait.texi@1.324 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait-opts@1.60 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait.1ntp-waitman@1.321 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait.1ntp-waitmdoc@1.322 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait.html@1.341 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait.man.in@1.321 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntp-wait/ntp-wait.mdoc.in@1.322 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/invoke-ntpsweep.texi@1.112 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep-opts@1.62 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep.1ntpsweepman@1.100 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep.1ntpsweepmdoc@1.100 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep.html@1.113 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep.man.in@1.100 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntpsweep/ntpsweep.mdoc.in@1.101 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/invoke-ntptrace.texi@1.113 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace-opts@1.62 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace.1ntptraceman@1.100 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace.1ntptracemdoc@1.101 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace.html@1.114 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace.man.in@1.100 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/ntptrace/ntptrace.mdoc.in@1.102 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary-opts@1.62 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary.1plot_summaryman@1.112 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary.1plot_summarymdoc@1.112 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary.html@1.115 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary.man.in@1.112 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/plot_summary.mdoc.in@1.112 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/summary-opts@1.62 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/summary.1summaryman@1.112 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/summary.1summarymdoc@1.112 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/summary.html@1.115 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/summary.man.in@1.112 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/summary.mdoc.in@1.112 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/invoke-update-leap.texi@1.13 +1 -1 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap-opts@1.13 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap.1update-leapman@1.13 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap.1update-leapmdoc@1.13 +2 -2 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap.html@1.13 +1 -1 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap.man.in@1.13 +3 -3 ++ NTP_4_2_8P6 ++ ++ scripts/update-leap/update-leap.mdoc.in@1.13 +2 -2 ++ NTP_4_2_8P6 ++ ++ sntp/invoke-sntp.texi@1.501 +2 -2 ++ NTP_4_2_8P6 ++ ++ sntp/sntp-opts.c@1.520 +10 -10 ++ NTP_4_2_8P6 ++ ++ sntp/sntp-opts.h@1.518 +4 -4 ++ NTP_4_2_8P6 ++ ++ sntp/sntp.1sntpman@1.336 +4 -4 ++ NTP_4_2_8P6 ++ ++ sntp/sntp.1sntpmdoc@1.336 +3 -3 ++ NTP_4_2_8P6 ++ ++ sntp/sntp.html@1.516 +2 -2 ++ NTP_4_2_8P6 ++ ++ sntp/sntp.man.in@1.336 +4 -4 ++ NTP_4_2_8P6 ++ ++ sntp/sntp.mdoc.in@1.336 +3 -3 ++ NTP_4_2_8P6 ++ ++ util/invoke-ntp-keygen.texi@1.504 +2 -2 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen-opts.c@1.522 +10 -10 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen-opts.h@1.520 +4 -4 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen.1ntp-keygenman@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen.1ntp-keygenmdoc@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen.html@1.178 +2 -2 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen.man.in@1.332 +4 -4 ++ NTP_4_2_8P6 ++ ++ util/ntp-keygen.mdoc.in@1.332 +3 -3 ++ NTP_4_2_8P6 ++ ++ChangeSet@1.3627, 2016-01-20 04:14:51-05:00, stenn@deacon.udel.edu ++ solaris hack ++ ++ libntp/work_thread.c@1.20 +2 -0 ++ solaris hack ++ ++ChangeSet@1.3626, 2016-01-20 01:50:09-05:00, stenn@deacon.udel.edu ++ 4.2.8p6 ++ ++ packageinfo.sh@1.523 +1 -1 ++ 4.2.8p6 ++ ++ChangeSet@1.3625, 2016-01-20 00:34:15+00:00, stenn@psp-deb1.ntp.org ++ updates ++ ++ NEWS@1.160 +24 -24 ++ updates ++ ++ChangeSet@1.3624, 2016-01-19 22:28:41+00:00, stenn@psp-deb1.ntp.org ++ typo ++ ++ NEWS@1.159 +1 -1 ++ typo ++ ++ChangeSet@1.3623, 2016-01-18 11:55:56+00:00, stenn@psp-deb1.ntp.org ++ [Sec 2936] Skeleton Key: Any trusted key system can serve time. HStenn. ++ ++ ChangeLog@1.1792 +1 -0 ++ [Sec 2936] Skeleton Key: Any trusted key system can serve time. HStenn. ++ ++ NEWS@1.158 +40 -0 *** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601270809.u0R89Wff063380>