Package: kfreebsd5-source
Severity: grave
Tags: security patch

On Fri, Apr 15, 2005 at 01:58:06AM +0000, FreeBSD Security Advisories wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> =============================================================================
> FreeBSD-SA-05:04.ifconf                                     Security Advisory
>                                                           The FreeBSD Project
> 
> Topic:          Kernel memory disclosure in ifconf()
> 
> Category:       core
> Module:         sys_net
> Announced:      2005-04-15
> Credits:        Ilja van Sprundel
> Affects:        All FreeBSD 4.x releases
>                 All FreeBSD 5.x releases prior to 5.4-RELEASE
> Corrected:      2005-04-15 01:51:44 UTC (RELENG_5, 5.4-STABLE)
>                 2005-04-15 01:52:03 UTC (RELENG_5_4, 5.4-RELEASE)
>                 2005-04-15 01:52:25 UTC (RELENG_5_3, 5.3-RELEASE-p9)
>                 2005-04-15 01:52:40 UTC (RELENG_4, 4.11-STABLE)
>                 2005-04-15 01:52:57 UTC (RELENG_4_11, 4.11-RELEASE-p3)
>                 2005-04-15 01:53:14 UTC (RELENG_4_10, 4.10-RELEASE-p8)
> 
> For general information regarding FreeBSD Security Advisories,
> including descriptions of the fields above, security branches, and the
> following sections, please visit
> <URL:http://www.freebsd.org/security/>.
> 
> I.   Background
> 
> The SIOCGIFCONF ioctl allows a user process to ask the kernel to produce
> a list of the existing network interfaces and copy it into a buffer
> provided by the user process.
> 
> II.  Problem Description
> 
> In generating the list of network interfaces, the kernel writes into a
> portion of a buffer without first zeroing it.  As a result, the prior
> contents of the buffer will be disclosed to the calling process.
> 
> III. Impact
> 
> Up to 12 bytes of kernel memory may be disclosed to the user process.
> Such memory might contain sensitive information, such as portions of
> the file cache or terminal buffers.  This information might be directly
> useful, or it might be leveraged to obtain elevated privileges in some
> way.  For example, a terminal buffer might include a user-entered
> password.
> 
> IV.  Workaround
> 
> No known workaround.
> 
> V.   Solution
> 
> Perform one of the following:
> 
> 1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the
> RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch dated after the
> correction date.
> 
> 2) To patch your present system:
> 
> The following patches have been verified to apply to FreeBSD 4.10, 4.11,
> and 5.3 systems.
> 
> a) Download the relevant patch from the location below, and verify the
> detached PGP signature using your PGP utility.
> 
> [FreeBSD 4.x]
> # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf4.patch
> # fetch 
> ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf4.patch.asc
> 
> [FreeBSD 5.3]
> # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf5.patch
> # fetch 
> ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf5.patch.asc
> 
> b) Apply the patch.
> 
> # cd /usr/src
> # patch < /path/to/patch
> 
> c) Recompile your kernel as described in
> <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
> system.
> 
> VI.  Correction details
> 
> The following list contains the revision numbers of each file that was
> corrected in FreeBSD.
> 
> Branch                                                           Revision
>   Path
> - -------------------------------------------------------------------------
> RELENG_4
>   src/sys/net/if.c                                              1.85.2.29
> RELENG_4_11
>   src/UPDATING                                              1.73.2.91.2.4
>   src/sys/conf/newvers.sh                                   1.44.2.39.2.7
>   src/sys/net/if.c                                          1.85.2.28.2.1
> RELENG_4_10
>   src/UPDATING                                              1.73.2.90.2.9
>   src/sys/conf/newvers.sh                                  1.44.2.34.2.10
>   src/sys/net/if.c                                          1.85.2.25.2.1
> RELENG_5
>   src/sys/net/if.c                                             1.199.2.15
> RELENG_5_4
>   src/UPDATING                                             1.342.2.24.2.3
>   src/sys/net/if.c                                         1.199.2.14.2.1
> RELENG_5_3
>   src/UPDATING                                            1.342.2.13.2.12
>   src/sys/conf/newvers.sh                                  1.62.2.15.2.14
>   src/sys/net/if.c                                          1.199.2.7.2.3
> - -------------------------------------------------------------------------
> 
> The latest revision of this advisory is available at
> ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:04.ifconf.asc
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.0 (FreeBSD)
> 
> iD8DBQFCXx8LFdaIBMps37IRAgEiAKCYfnAMPrVe72OPJMWtzMNrYmlPNgCfXRNe
> RYDaRrNgFPGsFWTuVujelco=
> =xLuH
> -----END PGP SIGNATURE-----
> _______________________________________________
> [EMAIL PROTECTED] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"

-- 
 .''`.   Proudly running Debian GNU/kFreeBSD unstable/unreleased (on UFS2+S)
: :' :
`. `'    http://www.debian.org/ports/kfreebsd-gnu
  `-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to