-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
              AUSCERT External Security Bulletin Redistribution
                             
              ESB-1999.048 -- NetBSD Security Advisory 1999-008
       Kernel hang or panic in name lookup under certain circumstances
                                20 April 1999

===========================================================================

The NetBSD Foundation, Inc. has released the following advisory concerning
a vulnerability which may allow unprivileged users to trigger a file-system
locking error, causing the system to panic or hang.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

                 NetBSD Security Advisory 1999-008
                 =================================

Topic:		Kernel hang or panic in name lookup under certain circumstances
Version:	NetBSD 1.3.X, NetBSD-current to 19990409, and
			early versions of NetBSD-1.4_ALPHA
Severity:	In later versions of -current and in 1.4_ALPHA, unprivileged
			users can panic the system.


Abstract
========

Unprivileged users can trigger a file-system locking error, causing the
system to panic or hang.  The following command sequence will trigger
the vulnerability:

	% ln -s ./ test
	% ln -s ./ test


Technical Details
=================

Certain kernel operations, such as creating a symbolic link, request that
the namei() path name resolution routine not unlock the node of the
directory containing the found file, instead returning it to the caller
locked.

When the found file is a symbolic link, this parent must be unlocked
before the symbolic link is looked up. This problem results from the test
to unlock the parent differing from the test to lock the parent. The
difference only manifests itself in the case of a path name which ends
with a symbolic link ending with one or more "/" characters.

NetBSD 1.3.3 and prior hang when this bug is exercised.  NetBSD-current
was enhanced to notice locking problems and thus panics instead of
hanging.


Solutions and Workarounds
=========================

There are no workarounds for this problem.  A patched kernel must be
installed to fix this problem.

A patch is available for NetBSD 1.3.3 which fixes this problem.  You
may find this patch on the NetBSD ftp server:

    ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/19990412-vfs_lookup

NetBSD-current since 19990409 is not vulnerable.  Users of NetBSD-current
should upgrade to a source tree later than 19990409.


Thanks To
=========

The NetBSD Project would like to thank Antti Kantee <pooka@iki.fi> and
Matthew Orgass <darkstar@pgh.net> for providing information about this
problem, and William Studenmund <wrstuden@netbsd.org> for providing a
solution.


Revision History
================

	1999/04/12 - initial version


More Information
================

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/.


Copyright 1999, The NetBSD Foundation, Inc.  All Rights Reserved.

$NetBSD: NetBSD-SA1999-008.txt,v 1.3 1999/04/12 18:58:18 mrg Exp $

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBNxJEUz5Ru2/4N2IFAQGjOwP/TQe7ydvPf2nMAVMoKGC9phVRylXEBF4Y
uRarfRXHtnQXAX5HRk9CDhjrEOSk+qAqLoRS81XCsRA4wRKDRUsPpmWd8NiW5v3W
WHrE3Iww4hn2SHGmuqtDVlb5uNRwZsq8xflL6O07xrxbTgmhYd9nSOvOKALlJw7M
PMXTR62g7SI=
=FAOF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It will
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBNx8JDSh9+71yA2DNAQGAXQP/QVN8DH3BIOYhxKwYvOTgarWQyym64D0K
TxyD0jG4HybFIDiZFoZ4REi24F9LK8+oeHSNgFFXflWk5x9L8BJL9tcXpWsu4Q4/
xdh14T1YW3f0z5+qV4C5K+pNM+A5BAgdq6bh5LYEsomMO/143yoLFDKReXigvrUA
yvmvy8AFxeg=
=Lsr4
-----END PGP SIGNATURE-----