=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN682
_____________________________________________________________________

DATE                      : 02/11/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : NetBSD.

======================================================================

The NetBSD Project is pleased to announce that update 2.0.3 of the NetBSD
operating system is now available as a source only update.

About NetBSD 2.0.3
- ------------------

NetBSD 2.0.3 is the third security/critical update of the NetBSD 2.0 release
branch. This represents a selected subset of fixes deemed critical in nature
for stability or security reasons.

All fixes in security/critical updates (ie, NetBSD 2.0.2, 2.0.3, etc)
are cumulative, so this latest update contains all such fixes since the
NetBSD 2.0 release.  These fixes will also appear in future
releases (NetBSD 2.1, 2.2, etc), together with other less-critical fixes
and feature enhancements.

Complete source for NetBSD 2.0.3 is available for download at many sites around
the world. A list of download sites providing FTP, AnonCVS, SUP, and other
services is provided at the end of this announcement; the latest list of
available download sites may also be found at:

http://www.NetBSD.org/mirrors/

About NetBSD
- ------------

The NetBSD operating system is a full-featured, open source, UNIX-like
operating system descended from the Berkeley Networking Release 2 (Net/2),
4.4BSD-Lite, and 4.4BSD-Lite2. NetBSD runs on 54 different system
architectures featuring 17 machine architectures across 17 distinct CPU
families, and is being ported to more.

NetBSD is a highly integrated system. In addition to its highly portable,
high performance kernel, NetBSD features a complete set of user utilities,
compilers for several languages, the X Window System, firewall software and
numerous other tools, all accompanied by full source code. The NetBSD
Packages Collection contains over 5000 packages and binary package releases
for a number of platforms are currently in progress.

More information on the goals of the NetBSD Project can be procured from the
NetBSD web site at:

http://www.NetBSD.org/Goals/

NetBSD is free. All of the code is under non-restrictive licenses, and may be
used without paying royalties to anyone. Free support services are available
via our mailing lists and web site. Commercial support is available from a
variety of sources; some are listed at:

http://www.NetBSD.org/gallery/consultants.html

More extensive information on NetBSD is available from the NetBSD web site:

http://www.NetBSD.org/

NetBSD is the work of a diverse group of people spread around the world. The
`Net' in our name is a tribute to the Internet, which enables us to
communicate and share code, and without which the project would not exist.

Major Changes Between 2.0.2 and 2.0.3
- -----------------------------------

The detailed list of changes can be found in the CHANGES-2.0.3 files in the
top level doc directory of the NetBSD 2.0.3 source tree.

A summary list of changes is as follows:

      Kernel

      o   Drop the big lock in upcallret() on powerpc to prevent hangs with
          pthreads on SMP systems.

      o   Fix "sleep forever" issue raise on sparc64 systems.

      o   For powerpc don't enable interrupts while calling trap() if the trap-
          ping frame didn't have them enabled either. Prevents crashes on some
          G4 based systems.

      o   Prevent random panics on process exit where calls to knote_fdclose()
          were being done on incorrect file descriptors.

      o   Remove code assuming kernfs supports mmap as it does not.

      o   Prevent a panic where disk interrupts could be enabled while the
          ATACH_TH_RUN flag is still set.

      o   In pmap_enter(), preset the mod/ref bits based on the flags argument
          to avoid possible data loss.

      o   Make sure buffer sizes are initialized correctly even when the pause
          state is explicitly set. Avoids crashes on some audio hardware.

      o   Fix memory leak in uipc_usrreq calls.

      o   Make PCI cards work on NetBSD-mappc systems with a "Grackle" bridge.

      o   Avoids deadlocks in the alpha pmap code between pmap_activate() and
          it's use of sched_lock.

      o   Protect the ipsec ioctls from negative offsets to prevent panics in
          m_copydata().

      o   The maximum file size on MS-DOS filesystems is 4 GB - 1 byte, so
          don't bother trying to write files bigger than this. Just return
          EFBIG to caller, rather than panic()ing later.

      o   Range check calls correctly in freebsd compat code to prevent data
          corruption and possible crashes.

      o   Handle MMX faults as floating exceptions. Matlab full functional
          again.

      Networking

      o   Prevent panics where it was possible to end up with a negative RTT.

      o   When adding or deleting multicast addresses, only change the address
          filter if the interface is marked RUNNING.

      o   Fix the HPC1 transmit logic on sgimips which was previously not work-
          ing.

      o   Make sure to purge prefixes from the ND list or else panics can
          result.

      o   Avoid an optimization in m_pulldown to avoid a prepend to the next
          mbuf in the chain if the result would still not have all data conti-
          nous. Prevents panics under certain circumstances.

      o   Prevent a panic on sun3 where NULL could be de-referenced in the case
          of #if NBPFILTER == 0

      o   Fix a possible data/pool corruption in the icmp6 code where possibly
          free'd data is reused.

      File system

      o   Fix a silent truncation problem that could cause corruption with
          large FFSv1 file systems.

      o   In ext2 check that we are not the pagedaemon as getblk() can return
          NULL in this case.

      Security

      o   Fix buffer overflows in telnet(1) identified in CAN 2005-0468 and
          2005-0469.

      o   Make verified exec functional again by using UIO_SYSSPACE for NDINIT.

      o   Prevent possible buffer overruns in telnetd(8) by removing static
          local variables so its easier to correctly use strlcpy.

      o   Prevent buffer overflows in cvs(1) by updating to version 1.11.20 in
          response to CAN-2005-0753.

      o   IPsec-AH was always calculated using the same key in AES-XCBC-MAC.

      o   Return correct error on all zero length codes in libz.

      o   Prevent vulnerability in cvs(1) reported in SA16553.

      o   Simplify code in procfs to check for a negative uio_offset at the
          beginning and check for attempts to write to init sooner and in all
          cases.

      o   Don't allow negative offsets when reading the message buffer, because
          it can allow reading arbitrary kernel memory.

      o   Remove unsafe /tmp file creation for the file.0 target when using
          imake(1)

      o   Fix security hole in Xserver(1) reported in CAN-2005-2495.

      o   Fix openssl 2.0 rollback, CAN-2005-2969.

      System administration and user tools

      o   Install xdm scripts as executable so that xdm will function and not
          consume 100% cpu.

      o   In user(8) be consistent when deleting a non-existent group - tell if
          the group is non-existent.

      o   Correctly set LOGNAME in new environment when using su(1)

      o   In amd(8) embed machine and cpu architecture correctly from target
          host environment, not from build host.

      o   Fix bug in sh(1) on big endian systems where underflowing a buffer
          when evaluating output from a back tick substitution can cause a
          crash.

      Miscellaneous

      o   Update copyright to 2005.

      o   Update to tzdata2005n. Lots of fixes, including most recently the
          leap second at the end of 2005 and the U.S. DST changes taking effect
          in 2007.

      o   Add support for ffsv2 to amd64 boot floppies.

Please note that at the moment, sysinst will not assist you in installing
pre-built third-party binary packages or the pkgsrc system itself. See the
NetBSD packages collection documentation:

http://www.NetBSD.org/Documentation/software/packages.html

Acknowledgments
- ---------------

The NetBSD Foundation would like to thank all those who have contributed code,
hardware, documentation, funds, colocation for our servers, web pages and
other documentation, release engineering, and other resources over the years.
More information on the people who make NetBSD happen is available at:

http://www.NetBSD.org/People/

We would like to especially thank the University of California at Berkeley and
the GNU Project for particularly large subsets of code that we use. We would
also like to thank the Internet Software Consortium and the Helsinki
University of Technology for current colocation services.

About the NetBSD Foundation
- ---------------------------

The NetBSD Foundation was chartered in 1995, with the task of overseeing core
NetBSD project services, promoting the project within industry and the open
source community, and holding intellectual property rights on much of the
NetBSD code base. Day-to-day operations of the project are handled by
volunteers.

As a non-profit organisation with no commercial backing, The NetBSD
Foundation depends on donations from its users, and we would like to ask
you to consider making a donation to the NetBSD Foundation in support of
continuing production of our fine operating system.

Donations can be done via PayPal (paypal@NetBSD.org) and are fully
tax-deductible in the US.  If you would prefer not to use PayPal, or
would like to make other arrangements, please contact
<finance-exec@NetBSD.org>.

NetBSD mirror sites
- -------------------

Please use a mirror site close to you.

     * FTP           - http://www.NetBSD.org/mirrors/#ftp
     * Anonymous CVS - http://www.NetBSD.org/mirrors/#anoncvs
     * SUP           - http://www.NetBSD.org/mirrors/#sup
     * CVSup         - http://www.NetBSD.org/mirrors/#cvsup

- ----------------------------------------------------------------------------------

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of NetBSD for the information
contained in this Briefing.
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical site
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they shall
not be liable for any loss or damage whatsoever, arising from or in connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- ----------------------------------------------------------------------------------

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================


