-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2005.0866 -- UNIRAS Brief 907/05
                               NetBSD 2.0.3
                              2 November 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           NetBSD 2.0.3
Publisher:         UNIRAS
Operating System:  NetBSD
Impact:            Denial of Service
                   Modify Arbitrary Files
                   Reduced Security
Access:            Existing Account
CVE Names:         CAN-2005-2969 CAN-2005-2495 CAN-2005-0753
                   CAN-2005-0469 CAN-2005-0468

- --------------------------BEGIN INCLUDED TEXT--------------------

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 907/05 dated 01.11.05  Time: 14:10  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

NetBSD 2.0.3

Detail
====== 


The NetBSD Project is pleased to announce that update 2.0.3 of the NetBSD
operating system is now available as a source only update.

About NetBSD 2.0.3
- ------------------

NetBSD 2.0.3 is the third security/critical update of the NetBSD 2.0 release
branch. This represents a selected subset of fixes deemed critical in nature
for stability or security reasons.

All fixes in security/critical updates (ie, NetBSD 2.0.2, 2.0.3, etc)
are cumulative, so this latest update contains all such fixes since the
NetBSD 2.0 release.  These fixes will also appear in future
releases (NetBSD 2.1, 2.2, etc), together with other less-critical fixes 
and feature enhancements.
     
Complete source for NetBSD 2.0.3 is available for download at many sites around
the world. A list of download sites providing FTP, AnonCVS, SUP, and other
services is provided at the end of this announcement; the latest list of 
available download sites may also be found at:

http://www.NetBSD.org/mirrors/

About NetBSD
- ------------

The NetBSD operating system is a full-featured, open source, UNIX-like
operating system descended from the Berkeley Networking Release 2 (Net/2),
4.4BSD-Lite, and 4.4BSD-Lite2. NetBSD runs on 54 different system     
architectures featuring 17 machine architectures across 17 distinct CPU
families, and is being ported to more. 
     
NetBSD is a highly integrated system. In addition to its highly portable,  
high performance kernel, NetBSD features a complete set of user utilities,   
compilers for several languages, the X Window System, firewall software and
numerous other tools, all accompanied by full source code. The NetBSD
Packages Collection contains over 5000 packages and binary package releases
for a number of platforms are currently in progress.

More information on the goals of the NetBSD Project can be procured from the
NetBSD web site at:

http://www.NetBSD.org/Goals/

NetBSD is free. All of the code is under non-restrictive licenses, and may be
used without paying royalties to anyone. Free support services are available
via our mailing lists and web site. Commercial support is available from a
variety of sources; some are listed at:

http://www.NetBSD.org/gallery/consultants.html

More extensive information on NetBSD is available from the NetBSD web site:

http://www.NetBSD.org/

NetBSD is the work of a diverse group of people spread around the world. The 
`Net' in our name is a tribute to the Internet, which enables us to
communicate and share code, and without which the project would not exist.

Major Changes Between 2.0.2 and 2.0.3
- -----------------------------------

The detailed list of changes can be found in the CHANGES-2.0.3 files in the 
top level doc directory of the NetBSD 2.0.3 source tree.

A summary list of changes is as follows:

     Kernel

     o   Drop the big lock in upcallret() on powerpc to prevent hangs with
         pthreads on SMP systems.

     o   Fix "sleep forever" issue raise on sparc64 systems.

     o   For powerpc don't enable interrupts while calling trap() if the trap-
         ping frame didn't have them enabled either. Prevents crashes on some
         G4 based systems.

     o   Prevent random panics on process exit where calls to knote_fdclose()
         were being done on incorrect file descriptors.

     o   Remove code assuming kernfs supports mmap as it does not.

     o   Prevent a panic where disk interrupts could be enabled while the
         ATACH_TH_RUN flag is still set.

     o   In pmap_enter(), preset the mod/ref bits based on the flags argument
         to avoid possible data loss.

     o   Make sure buffer sizes are initialized correctly even when the pause
         state is explicitly set. Avoids crashes on some audio hardware.

     o   Fix memory leak in uipc_usrreq calls.

     o   Make PCI cards work on NetBSD-mappc systems with a "Grackle" bridge.

     o   Avoids deadlocks in the alpha pmap code between pmap_activate() and
         it's use of sched_lock.

     o   Protect the ipsec ioctls from negative offsets to prevent panics in
         m_copydata().

     o   The maximum file size on MS-DOS filesystems is 4 GB - 1 byte, so
         don't bother trying to write files bigger than this. Just return
         EFBIG to caller, rather than panic()ing later.

     o   Range check calls correctly in freebsd compat code to prevent data
         corruption and possible crashes.

     o   Handle MMX faults as floating exceptions. Matlab full functional
         again.

     Networking

     o   Prevent panics where it was possible to end up with a negative RTT.

     o   When adding or deleting multicast addresses, only change the address
         filter if the interface is marked RUNNING.

     o   Fix the HPC1 transmit logic on sgimips which was previously not work-
         ing.

     o   Make sure to purge prefixes from the ND list or else panics can
         result.

     o   Avoid an optimization in m_pulldown to avoid a prepend to the next
         mbuf in the chain if the result would still not have all data conti-
         nous. Prevents panics under certain circumstances.

     o   Prevent a panic on sun3 where NULL could be de-referenced in the case
         of #if NBPFILTER == 0

     o   Fix a possible data/pool corruption in the icmp6 code where possibly
         free'd data is reused.

     File system

     o   Fix a silent truncation problem that could cause corruption with
         large FFSv1 file systems.

     o   In ext2 check that we are not the pagedaemon as getblk() can return
         NULL in this case.

     Security

     o   Fix buffer overflows in telnet(1) identified in CAN 2005-0468 and
         2005-0469.

     o   Make verified exec functional again by using UIO_SYSSPACE for NDINIT.

     o   Prevent possible buffer overruns in telnetd(8) by removing static
         local variables so its easier to correctly use strlcpy.

     o   Prevent buffer overflows in cvs(1) by updating to version 1.11.20 in
         response to CAN-2005-0753.

     o   IPsec-AH was always calculated using the same key in AES-XCBC-MAC.

     o   Return correct error on all zero length codes in libz.

     o   Prevent vulnerability in cvs(1) reported in SA16553.

     o   Simplify code in procfs to check for a negative uio_offset at the
         beginning and check for attempts to write to init sooner and in all
         cases.

     o   Don't allow negative offsets when reading the message buffer, because
         it can allow reading arbitrary kernel memory.

     o   Remove unsafe /tmp file creation for the file.0 target when using
         imake(1)

     o   Fix security hole in Xserver(1) reported in CAN-2005-2495.

     o   Fix openssl 2.0 rollback, CAN-2005-2969.

     System administration and user tools

     o   Install xdm scripts as executable so that xdm will function and not
         consume 100% cpu.

     o   In user(8) be consistent when deleting a non-existent group - tell if
         the group is non-existent.

     o   Correctly set LOGNAME in new environment when using su(1)

     o   In amd(8) embed machine and cpu architecture correctly from target
         host environment, not from build host.

     o   Fix bug in sh(1) on big endian systems where underflowing a buffer
         when evaluating output from a back tick substitution can cause a
         crash.

     Miscellaneous

     o   Update copyright to 2005.

     o   Update to tzdata2005n. Lots of fixes, including most recently the
         leap second at the end of 2005 and the U.S. DST changes taking effect
         in 2007.

     o   Add support for ffsv2 to amd64 boot floppies.

Please note that at the moment, sysinst will not assist you in installing    
pre-built third-party binary packages or the pkgsrc system itself. See the
NetBSD packages collection documentation:
         
http://www.NetBSD.org/Documentation/software/packages.html
     
Acknowledgments
- ---------------

The NetBSD Foundation would like to thank all those who have contributed code,
hardware, documentation, funds, colocation for our servers, web pages and
other documentation, release engineering, and other resources over the years.
More information on the people who make NetBSD happen is available at:

http://www.NetBSD.org/People/
         
We would like to especially thank the University of California at Berkeley and
the GNU Project for particularly large subsets of code that we use. We would
also like to thank the Internet Software Consortium and the Helsinki  
University of Technology for current colocation services.
     
About the NetBSD Foundation
- ---------------------------

The NetBSD Foundation was chartered in 1995, with the task of overseeing core
NetBSD project services, promoting the project within industry and the open
source community, and holding intellectual property rights on much of the
NetBSD code base. Day-to-day operations of the project are handled by
volunteers.    

As a non-profit organisation with no commercial backing, The NetBSD
Foundation depends on donations from its users, and we would like to ask 
you to consider making a donation to the NetBSD Foundation in support of 
continuing production of our fine operating system. 

Donations can be done via PayPal (paypal@NetBSD.org) and are fully
tax-deductible in the US.  If you would prefer not to use PayPal, or  
would like to make other arrangements, please contact    
<finance-exec@NetBSD.org>.

NetBSD mirror sites
- -------------------

Please use a mirror site close to you. 

    * FTP           - http://www.NetBSD.org/mirrors/#ftp
    * Anonymous CVS - http://www.NetBSD.org/mirrors/#anoncvs
    * SUP           - http://www.NetBSD.org/mirrors/#sup
    * CVSup         - http://www.NetBSD.org/mirrors/#cvsup 

- ----------------------------------------------------------------------------------

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of NetBSD for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ2g7JCh9+71yA2DNAQLtggP/SaKYNRPs9S0PrkHKt4Bm0UDKfYj7IUDj
Zn579iP5tP6cTadD8mxYDmPIDzKV1ZFoGSFVpWLTYi6tlCn09jtepBV3QZNelyf3
wsimB4DsyloH065+lN6SW2gi6z4/84y48UcJ5mDJfxthg960f58d1Py/Q6YtGqb4
wLpnuDqphAo=
=Qwxs
-----END PGP SIGNATURE-----