FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:15.sslSecurity Advisory The FreeBSD Project Topic: S

FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:16.rtld Security Advisory The FreeBSD Project Topic: I

FreeBSD Security Advisory FreeBSD-SA-09:17.freebsd-update

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:17.freebsd-update Security Advisory The FreeBSD Project Topic: I

bsd.security.see_other_uids affecting netstat?

2009-12-03 Thread Marc Silver
Hi guys, Please forgive if this is a bit of a noob question I noticed that when the bsd.security.see_other_uids sysctl is set to 0, the netstat command gives no output for users (non-root). I can't find any mention of this in any documentation ... is this intentional? Cheers, Marc -- Our deep

Re: bsd.security.see_other_uids affecting netstat?

2009-12-03 Thread pluknet
2009/12/3 Marc Silver : > Hi guys, > > Please forgive if this is a bit of a noob question > > I noticed that when the bsd.security.see_other_uids sysctl is set to 0, the > netstat command gives no output for users (non-root). No, it gives no access to sockets (switched to per-inpcb since 7) not ow

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Andrea Venturoli
FreeBSD Security Advisories ha scritto: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:16.rtld Security Advisory

ANNOUNCE: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:15.sslSecurity Advisory The FreeBSD Project Topic:

ANNOUNCE: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-09:17.freebsd-update

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:17.freebsd-update Security Advisory The FreeBSD Project Topic:

ANNOUNCE: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:16.rtld Security Advisory The FreeBSD Project Topic:

Re: Upcoming FreeBSD Security Advisory

2009-12-03 Thread Borja Marcos
On Dec 3, 2009, at 12:27 PM, Ivan Voras wrote: > Borja Marcos wrote: >> On Dec 1, 2009, at 2:20 AM, FreeBSD Security Officer wrote: >>> A short time ago a "local root" exploit was posted to the full-disclosure >>> mailing list; as the name suggests, this allows a local user to execute >>> arbitra

Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread Niels Bakker
Hi, = FreeBSD-SA-09:15.sslSecurity Advisory The FreeBSD Project [..] b) Execute the following commands as root: # cd /us

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Sorry, this might seem a stupid question, but... > In several places I read that FreeBSD 6.x is NOT affected; however, I > heard some people discussing how to apply the patch to such systems. > So, I'd like to know for sure: is 6.x affected? Is another patch on the > way for it? > > bye & Tha

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Andrea Venturoli
Jamie Landeg Jones ha scritto: So, yes, FreeBSD 6.3-RELEASE upwards are affected - FreeBSD 6.2 isn't. Thanks. So, is a patch on the way for 6.[34] too? I guess the sec team just wanted to get out what they had as soon as possible and I agree with them and thanks them. But I just need to plan

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Timo Schoeler
thus Jamie Landeg Jones spake: Sorry, this might seem a stupid question, but... In several places I read that FreeBSD 6.x is NOT affected; however, I heard some people discussing how to apply the patch to such systems. So, I'd like to know for sure: is 6.x affected? Is another patch on the way

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Henrique Araujo
Em Qui, 2009-12-03 às 09:30 +, FreeBSD Security Advisories escreveu: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > = > FreeBSD-SA-09:16.rtld Security Advisory >

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Maxim Khitrov
2009/12/3 Henrique Araujo : > Em Qui, 2009-12-03 às 09:30 +, FreeBSD Security Advisories escreveu: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> = >> FreeBSD-SA-09:16.rtld                                    

Re: rtld issue, MAC subsystem suggestion

2009-12-03 Thread Borja Marcos
On Dec 3, 2009, at 1:45 PM, Borja Marcos wrote: > There's a wrong assumption I made: the MAC subsystem should make a root > exploit hard to achieve, and the latest security issue shows that indeed > that's not necessarily the case. I chose not to chroot the runnnig CGI's so > that they saw a c

Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread Eygene Ryabinkin
Thu, Dec 03, 2009 at 02:09:36PM +0100, Niels Bakker wrote: > >= > >FreeBSD-SA-09:15.sslSecurity Advisory > > The FreeBSD Proje

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Jamie Landeg Jones ha scritto: > > > So, yes, FreeBSD 6.3-RELEASE upwards are affected - FreeBSD 6.2 isn't. > > Thanks. > So, is a patch on the way for 6.[34] too? > I guess the sec team just wanted to get out what they had as soon as > possible and I agree with them and thanks them. > But I jus

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Chuck Swiger
Hi-- On Dec 3, 2009, at 3:05 AM, Andrea Venturoli wrote: > Sorry, this might seem a stupid question, but... > In several places I read that FreeBSD 6.x is NOT affected; however, I heard > some people discussing how to apply the patch to such systems. So, I'd like > to know for sure: is 6.x affe

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> So, what would be 'best of practice' to apply the patch to 6.3-RELEASE > upwards -- is the FreeBSD-7 patch applicable or should one wait for an > official announcement? I just noticed that the patch I replied with is basically the same as the Freebsd-7 patch that was posted. However, as has a

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> The discussion you mention presumably involves checking out the patched > version of rtld sources from 7.x or 8 and building+installing that under 6.x. > Given that 6.x rtld is the older one with a longer history of security > review and doesn't have the current known vulnerability, whereas t

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Pieter de Boer
Jamie Landeg Jones wrote: > > However, I'd still apply the patch in case some other way to exploit > the non-checking of the unsetenv return status crops up elsewhere. > > It can't do any harm. The problem with that is, on 6.x, unsetenv() returns 'void', so there's no return value to check on.

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Timo Schoeler
On 12/03/2009 08:01 PM, Pieter de Boer wrote: > Jamie Landeg Jones wrote: >> >> However, I'd still apply the patch in case some other way to exploit >> the non-checking of the unsetenv return status crops up elsewhere. >> >> It can't do any harm. > > The problem with that is, on 6.x, unsetenv() re

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> > On 12/03/2009 08:01 PM, Pieter de Boer wrote: > > Jamie Landeg Jones wrote: > >> > >> However, I'd still apply the patch in case some other way to exploit > >> the non-checking of the unsetenv return status crops up elsewhere. > >> > >> It can't do any harm. > > > > The problem with that is, o

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Timo Schoeler
On 12/03/2009 08:15 PM, Andrew Thompson wrote: > On Thu, Dec 03, 2009 at 08:06:40PM +0100, Timo Schoeler wrote: >> On 12/03/2009 08:01 PM, Pieter de Boer wrote: >>> Jamie Landeg Jones wrote: However, I'd still apply the patch in case some other way to exploit the non-checking of the

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Andrew Thompson
On Thu, Dec 03, 2009 at 08:06:40PM +0100, Timo Schoeler wrote: > On 12/03/2009 08:01 PM, Pieter de Boer wrote: > > Jamie Landeg Jones wrote: > >> > >> However, I'd still apply the patch in case some other way to exploit > >> the non-checking of the unsetenv return status crops up elsewhere. > >> >

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread lxn smth
Any body can explain why no credit section for this advisory? On Thu, Dec 3, 2009 at 1:30 AM, FreeBSD Security Advisories wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > = > FreeBSD-SA-09:16.rtld            

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Any body can explain why no credit section for this advisory? Probably because the person who found the bug didn't notify the security team, but posted it on a public list to gain l33t points. ___ freebsd-security@freebsd.org mailing list http://lists.

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Dmitry Pryanishnikov
Just in case there is some other way of exploiting the fact that rtld.c didn't check whether unsetenv was successful (which I bet people are now looking for) I'd apply the patch to 6.3 and 6.4 also, just to be sure. Well, they can search as long as they wish - _but_ there's just nothing to

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Dmitry Pryanishnikov
Hello! The change that introduced the bug was made as follows: | Revision 1.124: download - view: text, markup, annotated - select for diffs | Thu May 17 18:00:27 2007 UTC (2 years, 6 months ago) by csjp | Branches: MAIN ... This was also ported MFC'd into 6.3 onwards: ... So, yes, Free

Re: Upcoming FreeBSD Security Advisory

2009-12-03 Thread Ivan Voras
Borja Marcos wrote: On Dec 1, 2009, at 2:20 AM, FreeBSD Security Officer wrote: A short time ago a "local root" exploit was posted to the full-disclosure mailing list; as the name suggests, this allows a local user to execute arbitrary code as root. Dr. Strangelove, or How I learned to love t

FreeBSD Security Advisory FreeBSD-SA-09:15.ssl [REVISED]

2009-12-03 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-09:15.sslSecurity Advisory The FreeBSD Project Topic: S

FreeBSD Security Advisory FreeBSD-SA-09:15.ssl

2009-12-03 Thread Garrett Wollman
< said: > NOTE WELL: This update causes OpenSSL to reject any attempt to renegotiate > SSL / TLS session parameters. As a result, connections in which the other > party attempts to renegotiate session parameters will break. In practice, > however, session renegotiation is a rarely-used feature,