oss-sec mailing list archives
Re: CVE Request: FreeBSD kernel
From: Colin Percival <cperciva () freebsd org>
Date: Mon, 24 Oct 2011 12:46:57 -0700
On 10/24/11 12:12, Eitan Adler wrote:
On Thu, Oct 20, 2011 at 12:26 PM, Moritz Muehlenhoff <jmm () debian org> wrote:http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.ascThis has been assigned CVE-2011-4062 by MITRE in the mean time.Something is odd with the MITRE CVE: According to http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4062 the bug is in the Linux emulation code. However the bug is really in the bind(2) system call. There was a different bug in the emulation code exposed by fixing the bind vulnerability but the system is vulnerable even without linux emulation turned on.
Indeed, the text on the CVE page is entirely bogus. I'd recommend using this text, from our advisory:
When a UNIX-domain socket is attached to a location using the bind(2) system call, the length of the provided path is not validated. Later, when this address was returned via other system calls, it is copied into a fixed-length buffer.
The places where the FreeBSD advisory mentions linux emulation relate only to the non-security bugfix which we rolled into the patch for the sake of avoiding breakage. (Is there anyone on the list who can fix the CVE description? If not, I'll poke the CVE folks directly.) -- Colin Percival Security Officer, FreeBSD | freebsd.org | The power to serve Founder / author, Tarsnap | tarsnap.com | Online backups for the truly paranoid
Current thread:
- CVE Request: pam Marc Deslauriers (Oct 18)
- Re: CVE Request: pam Josh Bressers (Oct 18)
- CVE Request: FreeBSD kernel Aurelien Jarno (Oct 19)
- Re: CVE Request: FreeBSD kernel Josh Bressers (Oct 20)
- Re: CVE Request: FreeBSD kernel Moritz Muehlenhoff (Oct 20)
- Re: CVE Request: FreeBSD kernel Eitan Adler (Oct 24)
- Re: CVE Request: FreeBSD kernel Colin Percival (Oct 24)
- Re: CVE Request: FreeBSD kernel Josh Bressers (Oct 20)