Source: libseccomp
Version: 2.3.3-4
Severity: important
Tags: security upstream
Forwarded: https://github.com/seccomp/libseccomp/issues/139
Control: found -1 2.3.1-2.1+deb9u1
Control: found -1 2.3.1-2.1
Control: affecs -1 tor,systemd

Hi

See: https://www.openwall.com/lists/oss-security/2019/03/15/1

> Jann Horn (CC'd) identified a problem in current versions of
> libseccomp where the library did not correctly generate 64-bit syscall
> argument comparisons using the arithmetic operators (LT, GT, LE, GE).
> Jann has done a search using codesearch.debian.net and it would appear
> that only systemd and Tor are using libseccomp in such a way as to
> trigger the bad code.  In the case of systemd this appears to affect
> the socket address family and scheduling class filters.  In the case
> of Tor it appears that the bad filters could impact the memory
> addresses passed to mprotect(2).
> 
> The libseccomp v2.4.0 release fixes this problem, and should be a
> direct drop-in replacement for previous v2.x releases.  Due the
> complexity, and associated risk, of backporting the fix to the v2.3.x
> release stream, I've made the difficult decision not to backport the
> fix.  Further, I'm not aware of any workarounds for this issue.
> Adminstrators and distros are strongly encouraged to upgrade to
> libseccomp v2.4.0 as soon as possible.
> 
> The related GitHub issue, complete with a brief discussion of the
> problem and a list of the assocated patches can be found at the link
> below:
> 
> * https://github.com/seccomp/libseccomp/issues/139
> 
> The libseccomp v2.4.0 release can be found at the link below:
> 
> * https://github.com/seccomp/libseccomp/releases/tag/v2.4.0

Regards,
Salvatore

Reply via email to