Your message dated Fri, 15 Apr 2005 10:17:17 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#304766: fixed in kfreebsd5-source 5.3-9 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 15 Apr 2005 10:58:37 +0000 >From [EMAIL PROTECTED] Fri Apr 15 03:58:37 2005 Return-path: <[EMAIL PROTECTED]> Received: from 216.red-62-57-140.user.auna.net (aragorn) [62.57.140.216] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DMOWy-0007Am-00; Fri, 15 Apr 2005 03:58:36 -0700 Received: from rmh by aragorn with local (Exim 4.50) id 1DMOWx-0003EI-GM for [EMAIL PROTECTED]; Fri, 15 Apr 2005 12:58:35 +0200 Date: Fri, 15 Apr 2005 12:58:35 +0200 From: Robert Millan <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Fwd: FreeBSD Security Advisory FreeBSD-SA-05:04.ifconf Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> Sender: Robert Millan <[EMAIL PROTECTED]> Organisation: free as in freedom User-Agent: Mutt/1.5.9i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kfreebsd5-source Severity: grave Tags: security patch On Fri, Apr 15, 2005 at 01:58:06AM +0000, FreeBSD Security Advisories wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > ============================================================================= > FreeBSD-SA-05:04.ifconf Security Advisory > The FreeBSD Project > > Topic: Kernel memory disclosure in ifconf() > > Category: core > Module: sys_net > Announced: 2005-04-15 > Credits: Ilja van Sprundel > Affects: All FreeBSD 4.x releases > All FreeBSD 5.x releases prior to 5.4-RELEASE > Corrected: 2005-04-15 01:51:44 UTC (RELENG_5, 5.4-STABLE) > 2005-04-15 01:52:03 UTC (RELENG_5_4, 5.4-RELEASE) > 2005-04-15 01:52:25 UTC (RELENG_5_3, 5.3-RELEASE-p9) > 2005-04-15 01:52:40 UTC (RELENG_4, 4.11-STABLE) > 2005-04-15 01:52:57 UTC (RELENG_4_11, 4.11-RELEASE-p3) > 2005-04-15 01:53:14 UTC (RELENG_4_10, 4.10-RELEASE-p8) > > For general information regarding FreeBSD Security Advisories, > including descriptions of the fields above, security branches, and the > following sections, please visit > <URL:http://www.freebsd.org/security/>. > > I. Background > > The SIOCGIFCONF ioctl allows a user process to ask the kernel to produce > a list of the existing network interfaces and copy it into a buffer > provided by the user process. > > II. Problem Description > > In generating the list of network interfaces, the kernel writes into a > portion of a buffer without first zeroing it. As a result, the prior > contents of the buffer will be disclosed to the calling process. > > III. Impact > > Up to 12 bytes of kernel memory may be disclosed to the user process. > Such memory might contain sensitive information, such as portions of > the file cache or terminal buffers. This information might be directly > useful, or it might be leveraged to obtain elevated privileges in some > way. For example, a terminal buffer might include a user-entered > password. > > IV. Workaround > > No known workaround. > > V. Solution > > Perform one of the following: > > 1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the > RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch dated after the > correction date. > > 2) To patch your present system: > > The following patches have been verified to apply to FreeBSD 4.10, 4.11, > and 5.3 systems. > > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > > [FreeBSD 4.x] > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf4.patch > # fetch > ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf4.patch.asc > > [FreeBSD 5.3] > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf5.patch > # fetch > ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:04/ifconf5.patch.asc > > b) Apply the patch. > > # cd /usr/src > # patch < /path/to/patch > > c) Recompile your kernel as described in > <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the > system. > > VI. Correction details > > The following list contains the revision numbers of each file that was > corrected in FreeBSD. > > Branch Revision > Path > - ------------------------------------------------------------------------- > RELENG_4 > src/sys/net/if.c 1.85.2.29 > RELENG_4_11 > src/UPDATING 1.73.2.91.2.4 > src/sys/conf/newvers.sh 1.44.2.39.2.7 > src/sys/net/if.c 1.85.2.28.2.1 > RELENG_4_10 > src/UPDATING 1.73.2.90.2.9 > src/sys/conf/newvers.sh 1.44.2.34.2.10 > src/sys/net/if.c 1.85.2.25.2.1 > RELENG_5 > src/sys/net/if.c 1.199.2.15 > RELENG_5_4 > src/UPDATING 1.342.2.24.2.3 > src/sys/net/if.c 1.199.2.14.2.1 > RELENG_5_3 > src/UPDATING 1.342.2.13.2.12 > src/sys/conf/newvers.sh 1.62.2.15.2.14 > src/sys/net/if.c 1.199.2.7.2.3 > - ------------------------------------------------------------------------- > > The latest revision of this advisory is available at > ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:04.ifconf.asc > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.0 (FreeBSD) > > iD8DBQFCXx8LFdaIBMps37IRAgEiAKCYfnAMPrVe72OPJMWtzMNrYmlPNgCfXRNe > RYDaRrNgFPGsFWTuVujelco= > =xLuH > -----END PGP SIGNATURE----- > _______________________________________________ > [EMAIL PROTECTED] mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications > To unsubscribe, send any mail to "[EMAIL PROTECTED]" -- .''`. Proudly running Debian GNU/kFreeBSD unstable/unreleased (on UFS2+S) : :' : `. `' http://www.debian.org/ports/kfreebsd-gnu `- --------------------------------------- Received: (at 304766-close) by bugs.debian.org; 15 Apr 2005 14:28:37 +0000 >From [EMAIL PROTECTED] Fri Apr 15 07:28:37 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DMRoD-00044E-00; Fri, 15 Apr 2005 07:28:37 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DMRdF-00033d-00; Fri, 15 Apr 2005 10:17:17 -0400 From: Robert Millan <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#304766: fixed in kfreebsd5-source 5.3-9 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Fri, 15 Apr 2005 10:17:17 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: kfreebsd5-source Source-Version: 5.3-9 We believe that the bug you reported is fixed in the latest version of kfreebsd5-source, which is due to be installed in the Debian FTP archive: kfreebsd5-source_5.3-9.diff.gz to pool/main/k/kfreebsd5-source/kfreebsd5-source_5.3-9.diff.gz kfreebsd5-source_5.3-9.dsc to pool/main/k/kfreebsd5-source/kfreebsd5-source_5.3-9.dsc kfreebsd5-source_5.3-9_all.deb to pool/main/k/kfreebsd5-source/kfreebsd5-source_5.3-9_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Robert Millan <[EMAIL PROTECTED]> (supplier of updated kfreebsd5-source package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 15 Apr 2005 12:59:58 +0200 Source: kfreebsd5-source Binary: kfreebsd5-source Architecture: source all Version: 5.3-9 Distribution: unstable Urgency: low Maintainer: Robert Millan <[EMAIL PROTECTED]> Changed-By: Robert Millan <[EMAIL PROTECTED]> Description: kfreebsd5-source - source code for kernel of FreeBSD 5.3 Closes: 304766 Changes: kfreebsd5-source (5.3-9) unstable; urgency=low . * Fix memory leak in ifconf (FreeBSD-SA-05:04.ifconf / Closes: #304766). - patches/009_ifconf_memleak.diff: New. Patch from upstream. Files: 21a6d968af338efcb7f4061d6561755c 684 devel optional kfreebsd5-source_5.3-9.dsc bda9d7fcd4e4eb78e636298d5d1055de 78149 devel optional kfreebsd5-source_5.3-9.diff.gz 99a9924b6ebfd4704ee38836ded791d1 13070006 devel optional kfreebsd5-source_5.3-9_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCX6ZhC19io6rUCv8RAjK/AKCIpcqTDTUNmbLmcqnugtE0/Xd0LQCfbRV7 gqHTLMM4+jGjiegF0+yByTY= =XZns -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]