Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-1999.048 -- NetBSD Security Advisory 1999-008 Kernel hang or panic in name lookup under certain circumstances 20 April 1999 =========================================================================== The NetBSD Foundation, Inc. has released the following advisory concerning a vulnerability which may allow unprivileged users to trigger a file-system locking error, causing the system to panic or hang. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 1999-008 ================================= Topic: Kernel hang or panic in name lookup under certain circumstances Version: NetBSD 1.3.X, NetBSD-current to 19990409, and early versions of NetBSD-1.4_ALPHA Severity: In later versions of -current and in 1.4_ALPHA, unprivileged users can panic the system. Abstract ======== Unprivileged users can trigger a file-system locking error, causing the system to panic or hang. The following command sequence will trigger the vulnerability: % ln -s ./ test % ln -s ./ test Technical Details ================= Certain kernel operations, such as creating a symbolic link, request that the namei() path name resolution routine not unlock the node of the directory containing the found file, instead returning it to the caller locked. When the found file is a symbolic link, this parent must be unlocked before the symbolic link is looked up. This problem results from the test to unlock the parent differing from the test to lock the parent. The difference only manifests itself in the case of a path name which ends with a symbolic link ending with one or more "/" characters. NetBSD 1.3.3 and prior hang when this bug is exercised. NetBSD-current was enhanced to notice locking problems and thus panics instead of hanging. Solutions and Workarounds ========================= There are no workarounds for this problem. A patched kernel must be installed to fix this problem. A patch is available for NetBSD 1.3.3 which fixes this problem. You may find this patch on the NetBSD ftp server: ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/19990412-vfs_lookup NetBSD-current since 19990409 is not vulnerable. Users of NetBSD-current should upgrade to a source tree later than 19990409. Thanks To ========= The NetBSD Project would like to thank Antti Kantee <pooka@iki.fi> and Matthew Orgass <darkstar@pgh.net> for providing information about this problem, and William Studenmund <wrstuden@netbsd.org> for providing a solution. Revision History ================ 1999/04/12 - initial version More Information ================ Information about NetBSD and NetBSD security can be found at http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/. Copyright 1999, The NetBSD Foundation, Inc. All Rights Reserved. $NetBSD: NetBSD-SA1999-008.txt,v 1.3 1999/04/12 18:58:18 mrg Exp $ - -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQCVAwUBNxJEUz5Ru2/4N2IFAQGjOwP/TQe7ydvPf2nMAVMoKGC9phVRylXEBF4Y uRarfRXHtnQXAX5HRk9CDhjrEOSk+qAqLoRS81XCsRA4wRKDRUsPpmWd8NiW5v3W WHrE3Iww4hn2SHGmuqtDVlb5uNRwZsq8xflL6O07xrxbTgmhYd9nSOvOKALlJw7M PMXTR62g7SI= =FAOF - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It will not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBNx8JDSh9+71yA2DNAQGAXQP/QVN8DH3BIOYhxKwYvOTgarWQyym64D0K TxyD0jG4HybFIDiZFoZ4REi24F9LK8+oeHSNgFFXflWk5x9L8BJL9tcXpWsu4Q4/ xdh14T1YW3f0z5+qV4C5K+pNM+A5BAgdq6bh5LYEsomMO/143yoLFDKReXigvrUA yvmvy8AFxeg= =Lsr4 -----END PGP SIGNATURE-----