Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]

2011-11-21 Thread Dag-Erling Smørgrav
Jason Hellenthal jh...@dataix.net writes:
 Sorry but this security advisory has nothing to do with your
 misconfiguration of your system.

Perhaps you should read the updated advisory before shooting Richard
down in flames.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to freebsd-security-unsubscr...@freebsd.org


Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]

2011-11-20 Thread Jason Hellenthal

Sorry but this security advisory has nothing to do with your misconfiguration 
of your system.

On Sun, Nov 20, 2011 at 11:18:33PM +, Richard M. Timoney wrote:
 As far as I can see the bug mentioned in the above advisory is not fully
 fixed.
 
 When logged in to a FreeBSD 8.2 machine with freshly updated /usr/src
 (world and kernel) [made on Wed Nov 16] via an XDMCP session, acroread
 says
 
 No protocol specified
 
 (acroread:2908): Gtk-WARNING **: cannot open display:
 pc200404.maths.tcd.ie:0.0
 
 Logged in to the same host via ssh -Y , I have DISPLAY set to something
 like localhost:10.0 and acroread does launch. It also launches on the
 console X display.
 
 I would be happy with pointers as to a fix for this.
 
 Yours,
 
 Richard Timoney
 
 -- 
 Richard M. Timoney
 (richa...@maths.tcd.ie)   Tel. +353-1-896 1196
 School of Mathematics, Trinity College, Dublin 2, Ireland
 WWW http://www.maths.tcd.ie/~richardt FAX  +353-1-896 2282
 ___
 freebsd-security@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-security
 To unsubscribe, send any mail to freebsd-security-unsubscr...@freebsd.org
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to freebsd-security-unsubscr...@freebsd.org


Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]

2011-10-04 Thread Mark Duller
On 10/04/11 20:15, FreeBSD Security Advisories wrote:
 =

 
FreeBSD-SA-11:05.unix   Security
Advisory
 The FreeBSD Project
 
 Topic:  Buffer overflow in handling of UNIX socket
 addresses
 
 Category:   core Module: kern Announced:
 2011-09-28 Credits:Mateusz Guzik Affects:All
 supported versions of FreeBSD.
snip
 IV.  Workaround
 
 No workaround is available, but systems without untrusted local
 users are not vulnerable.

Does this affect a default FreeBSD install? I believe linux emulation
support is disabled by default?

Mark
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to freebsd-security-unsubscr...@freebsd.org


Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]

2011-10-04 Thread Matthew Seaman
On 04/10/2011 21:38, Mark Duller wrote:
 On 10/04/11 20:15, FreeBSD Security Advisories wrote:
  =
 
  
 FreeBSD-SA-11:05.unix   Security
 Advisory
  The FreeBSD Project
  
  Topic:  Buffer overflow in handling of UNIX socket
  addresses
  
  Category:   core Module: kern Announced:
  2011-09-28 Credits:Mateusz Guzik Affects:All
  supported versions of FreeBSD.
 snip
  IV.  Workaround
  
  No workaround is available, but systems without untrusted local
  users are not vulnerable.

 Does this affect a default FreeBSD install? I believe linux emulation
 support is disabled by default?

Ish.  Sort of.  The default system contains the linux.ko loadable module
which is not loaded by default, but would be caused to automatically
load into the kernel by installing one of the linux_base ports.  Nothing
needs to be re-compiled in order to enable linux compat, and it doesn't
even require a reboot, but it does require root privileges to kldload
the module.

The underlying unix domain socket vulnerability affected all released
and development versions of FreeBSD up to the point where the advisory
was first issued.  If you'ld applied the patches from the original
advisory then you should already be secure.  If your system definitely
doesn't run any linux binaries and never will do, then the additional
bits in the revised patch won't do anything for you.  However, without
the additional changes any linux applications that try to use unix
domain sockets will crash.  This doesn't result in any additional
security exposure, but it certainly won't endear your users to you.

Cheers,

Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
  Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
JID: matt...@infracaninophile.co.uk   Kent, CT11 9PW



signature.asc
Description: OpenPGP digital signature