Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 02 Dec 2024 11:29:22 -0500
From:      "Dan Langille" <dan@langille.org>
To:        "Jos Chrispijn" <josc@cloudzeeland.nl>, "FreeBSD Mailing List" <freebsd-questions@freebsd.org>, "Philip Paeps" <philip@freebsd.org>
Subject:   Re: FreeBSD-kernel-13.4_1 is vulnerable
Message-ID:  <798fddc5-c2e9-4c2a-a64d-3627a9bc36f7@app.fastmail.com>
In-Reply-To: <b3545eca-5a07-4755-a01b-a5a461951770@cloudzeeland.nl>
References:  <b3545eca-5a07-4755-a01b-a5a461951770@cloudzeeland.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
--b6e301d2b9894164b72bcd70fc4e06fc
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

In this reply, I have cc'd philip@ - we have discussed this issue over the years.

On Fri, Nov 29, 2024, at 4:05 AM, Jos Chrispijn wrote:
> Not sure if I oversee an update, but still get this message
> 
> Checking for security vulnerabilities in base (userland & kernel):
> Database fetched: 2024-11-27T23:30+01:00
> FreeBSD-kernel-13.4_1 is vulnerable:
>   FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer
>   CVE: CVE-2024-39281
>   WWW: https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html
> 
> Understand that for FreeBSD 14 this issue has been solved.
> Can you tell me when a fix will be released for 13.4?

I have the same issue with FreeBSD 14.1-RELEASE-p5 - the problem is not (in this case) an unpatched system. It is a false positive. The vuxml database seems to relate only to kernel vulns, and is not aware that sometimes a vuln affects userland.  In this case, the userland is vuln (and patched) - pkg-base-audit is unaware of that.

To me, it is important to fix the problem because false positives develop into alert fatigue and cause unnecessary work.

[16:16 r730-01 dvl ~] % sudo /usr/local/etc/periodic/security/405.pkg-base-audit

Checking for security vulnerabilities in base (userland & kernel):
Host system:
vulnxml file up-to-date
FreeBSD-kernel-14.1_5 is vulnerable:
  FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer
  CVE: CVE-2024-39281
  WWW: https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html <https://vuxml.freebsd.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html>;

[16:17 r730-01 dvl ~] % pkg which /usr/local/etc/periodic/security/405.pkg-base-audit
/usr/local/etc/periodic/security/405.pkg-base-audit was installed by package pkg-1.21.3

The problem is the kernel version and user version differ:

[16:17 r730-01 dvl ~] % freebsd-version -u  
14.1-RELEASE-p6
[16:17 r730-01 dvl ~] % 

I believe the problem is with the 405.pkg-base-audit which is looking only at the kernel version:

[16:18 r730-01 dvl ~] % freebsd-version -k                                           
14.1-RELEASE-p5

... not knowing that the vuln is in the userland, not the kernel.

My wild idea here:

* indicate with each vuln: userland or kernel?
* when checking for a vuln, consult the above new flag and check the appropriate value

Phillip: is my idea wildly offbase?
--
  Dan Langille
  dan@langille.org


--b6e301d2b9894164b72bcd70fc4e06fc
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html><html><head><title></title><style type=3D"text/css">p.Mso=
Normal,p.MsoNoSpacing{margin:0}</style></head><body><div>In this reply, =
I have cc'd&nbsp;philip@ - we have discussed this issue over the years.<=
br></div><div><br></div><div>On Fri, Nov 29, 2024, at 4:05 AM, Jos Chris=
pijn wrote:<br></div><blockquote type=3D"cite" id=3D"qt" style=3D""><spa=
n class=3D"font" style=3D"font-family:&quot;Courier New&quot;, Courier, =
monospace;">Not sure if I oversee=0A      an update, but still get this =
message<br> <br> Checking for security vulnerabilities in base (userland=
=0A      &amp; kernel):<br> Database fetched: 2024-11-27T23:30+01:00<br>=
 FreeBSD-kernel-13.4_1 is vulnerable:<br> <span style=3D"">&nbsp; </span=
>FreeBSD --=0A      Unbounded allocation in ctl(4) CAM Target Layer<br> =
<span style=3D"">&nbsp; </span>CVE:=0A      CVE-2024-39281<br> <span sty=
le=3D"">&nbsp; </span>WWW: <a href=3D"https://vuxml.FreeBSD.org/freebsd/=
8caa5d60-a174-11ef-9a62-002590c1f29c.html">https://vuxml.FreeBSD.org/fre=
ebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html</a><br> <br> Understand t=
hat for FreeBSD 14 this issue has been solved.<br> Can you tell me when =
a fix will be released for 13.4?<br> </span></blockquote><div><br></div>=
<div>I have the same issue with&nbsp;FreeBSD 14.1-RELEASE-p5 - the probl=
em is not (in this case) an unpatched system. It is a false positive. Th=
e vuxml database seems to relate only to kernel vulns, and is not aware =
that sometimes a vuln affects userland. &nbsp;In this case, the userland=
 is vuln (and patched) - pkg-base-audit is unaware of that.<br></div><di=
v><br></div><div>To me, it is important to fix the problem because false=
 positives develop into alert fatigue and cause unnecessary work.</div><=
div><br></div><div>[16:16 r730-01 dvl ~] % sudo /usr/local/etc/periodic/=
security/405.pkg-base-audit<br></div><div><br style=3D"max-width:100%;he=
ight:auto;"></div><div>Checking for security vulnerabilities in base (us=
erland &amp; kernel):<br style=3D"max-width:100%;height:auto;"></div><di=
v>Host system:<br style=3D"max-width:100%;height:auto;"></div><div>vulnx=
ml file up-to-date<br style=3D"max-width:100%;height:auto;"></div><div>F=
reeBSD-kernel-14.1_5 is vulnerable:<br style=3D"max-width:100%;height:au=
to;"></div><div>&nbsp; FreeBSD -- Unbounded allocation in ctl(4) CAM Tar=
get Layer<br style=3D"max-width:100%;height:auto;"></div><div>&nbsp; CVE=
: CVE-2024-39281<br style=3D"max-width:100%;height:auto;"></div><div>&nb=
sp; WWW: <a href=3D"https://vuxml.freebsd.org/freebsd/8caa5d60-a174-11ef=
-9a62-002590c1f29c.html">https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174=
-11ef-9a62-002590c1f29c.html</a><br style=3D"max-width:100%;height:auto;=
"></div><div><br></div><div>[16:17 r730-01 dvl ~] % pkg which /usr/local=
/etc/periodic/security/405.pkg-base-audit<br></div><div>/usr/local/etc/p=
eriodic/security/405.pkg-base-audit was installed by package pkg-1.21.3<=
br style=3D"max-width:100%;height:auto;"></div><div><br></div><div>The p=
roblem is the kernel version and user version differ:<br></div><div><br>=
</div><div>[16:17 r730-01 dvl ~] % freebsd-version -u&nbsp;&nbsp;<br></d=
iv><div>14.1-RELEASE-p6<br style=3D"max-width:100%;height:auto;"></div><=
div>[16:17 r730-01 dvl ~] %&nbsp;<br></div><div><br></div><div>I believe=
 the problem is with the&nbsp;405.pkg-base-audit which is looking only a=
t the kernel version:<br></div><div><br></div><div>[16:18 r730-01 dvl ~]=
 % freebsd-version -k&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br></div=
><div>14.1-RELEASE-p5<br style=3D"max-width:100%;height:auto;"></div><di=
v><br></div><div>... not knowing that the vuln is in the userland, not t=
he kernel.<br></div><div><br></div><div>My wild idea here:<br></div><div=
><br></div><div>* indicate with each vuln: userland or kernel?<br></div>=
<div>* when checking for a vuln, consult the above new flag and check th=
e appropriate value<br></div><div><br></div><div>Phillip: is my idea wil=
dly offbase?<br></div><div id=3D"sig65064480"><div class=3D"signature">-=
-<br></div><div class=3D"signature">&nbsp; Dan Langille<br></div><div cl=
ass=3D"signature">&nbsp; dan@langille.org<br></div><div class=3D"signatu=
re"><br></div></div><div><br></div></body></html>
--b6e301d2b9894164b72bcd70fc4e06fc--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?798fddc5-c2e9-4c2a-a64d-3627a9bc36f7>