double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)
https://marc.info/?l=oss-security&m=167628974320957&w=2 [marc.info]
2023-02-16 20:18
tags:
exploit
malloc
openbsd
programming
security
Exploiting this vulnerability will not be easy: modern memory allocators provide protections against double frees, and the impacted sshd process is unprivileged and heavily sandboxed.
Quick update: we were able to gain arbitrary control of the “rip” register through this bug (i.e., we can jump wherever we want in sshd’s address space) on an unpatched installation of OpenBSD 7.2 (which runs OpenSSH 9.1 by default). This is by no means the end of the story: this was only step 1, bypass the malloc and double-free protections.
source: L
Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726)
https://marc.info/?l=oss-security&m=157609898721656&w=2 [marc.info]
2019-12-11 23:22
tags:
auth
exploit
malloc
openbsd
programming
security
1a/ we set the LD_LIBRARY_PATH environment variable to one single dot (the current working directory) and approximately ARG_MAX colons (the maximum number of bytes for the argument and environment list); as described in man ld.so:
1b/ we set the RLIMIT_DATA resource limit to ARG_MAX * sizeof(char *) (2MB on amd64, 1MB on i386); as described in man setrlimit:
[CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections.
https://marc.info/?l=oss-security&m=157551346420739&w=2 [marc.info]
2019-12-06 20:17
tags:
exploit
networking
security
I am reporting a vulnerability that exists on most Linux distros, and other *nix operating systems which allows a network adjacent attacker to determine if another user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website. Additionally, we are able to determine the exact seq and ack numbers by counting encrypted packets and/or examining their size. This allows us to inject data into the TCP stream and hijack connections.
Some more info in replies, such as https://marc.info/?l=oss-security&m=157554332429760&w=2.
U2F support in OpenSSH
https://marc.info/?l=openssh-unix-dev&m=157259802529972&w=2 [marc.info]
2019-11-03 20:26
tags:
admin
auth
hardware
networking
openbsd
security
update
OpenBSD 6.5 released
https://marc.info/?l=openbsd-announce&m=155611207805565&w=2 [marc.info]
2019-04-24 15:15
tags:
openbsd
release
We are pleased to announce the official release of OpenBSD 6.5. This is our 46th release.
source: L
XSA-294 - x86 shadow: Insufficient TLB flushing when using PCID
https://marc.info/?l=oss-security&m=155178973728914&w=2 [marc.info]
2019-04-04 04:51
tags:
bugfix
cpu
security
systems
virtualization
Use of Process Context Identifiers (PCID) was introduced into Xen in order to improve performance after XSA-254 (and in particular its Meltdown sub-issue). This enablement implied changes to the TLB flushing logic. One aspect which was overlooked is the safety of switching between shadow pagetables, which previously relied on the unconditional flushing of a write to CR3.
With PCID enabled, a switch of shadow pagetable for a 64bit PV guest fails to invalidate the linear mappings of the previous shadow pagetable. As a result, subsequent accesses to the shadow pagetables may be deemed to be safe by the shadow logic (based on the old shadow pagetable) but fault when made in practice.
default to OXTABS off
https://marc.info/?l=openbsd-cvs&m=155238850020246&w=2 [marc.info]
2019-03-13 22:05
tags:
bugfix
openbsd
retro
tty
Almost all terminals now support hardware tabs so default to OXTABS off.
The future is here!
wump: incorrect wumpus movement probability
https://marc.info/?l=openbsd-bugs&m=154529364730319&w=2 [marc.info]
2018-12-20 16:06
tags:
bugfix
c
gaming
openbsd
random
The computation of wumpus movement probability in games/wump/wump.c has a parenthesis problem that causes it not to work the way it evidently is meant to.
Multiple telnet.c overflows
https://marc.info/?l=oss-security&m=154455449517302&w=2 [marc.info]
2018-12-11 22:17
tags:
c
networking
retro
security
When a telnet server requests environment options the sprintf on line 1002 will not perform bounds checking and causes an overflow of stack buffer temp[50] defined at line 990. This issue can be trivially fixed using a patch to add bounds checking to sprintf such as with a call to snprintf();
What is dead may never die.
Better handle automatic column width assignments
https://marc.info/?l=openbsd-cvs&m=154345651029561&w=2 [marc.info]
2018-11-29 15:34
tags:
bugfix
docs
openbsd
text
Modified files:
usr.bin/mandoc : out.c
Log message:
Better handle automatic column width assignments in the presence of horizontal spans, by implementing a moderately difficult iterative algoritm. The benefit is that spans containing long text no longer cause an excessive width of their starting column.
Also, use unicode for drawing: https://marc.info/?l=openbsd-cvs&m=154338047707592&w=2
And some other assorted commits that are fun.
WireGuard: Secure Network Tunnel
https://marc.info/?l=linux-netdev&m=153306429108040&w=2 [marc.info]
2018-08-02 17:23
tags:
linux
networking
security
WireGuard is a secure network tunnel written especially for Linux, which has faced around three years of serious development, deployment, and scrutiny. It delivers excellent performance and is extremely easy to use and configure. It has been designed with the primary goal of being both easy to audit by virtue of being small and highly secure from a cryptography and systems security perspective. WireGuard is used by some massive companies pushing enormous amounts of traffic, and likely already today you’ve consumed bytes that at some point transited through a WireGuard tunnel. Even as an out-of-tree module, WireGuard has been integrated into various userspace tools, Linux distributions, mobile phones, and data centers. There are ports in several languages to several operating systems, and even commercial hardware and services sold integrating WireGuard. It is time, therefore, for WireGuard to be properly integrated into Linux.
stack-register checking
https://marc.info/?l=openbsd-tech&m=152035796722258&w=2 [marc.info]
2018-03-06 23:35
tags:
defense
malloc
openbsd
security
update
How about we add another new permission! This is not a hardware permission, but a software permission. It is opportunistically enforced by the kernel.
the permission is MAP_STACK. If you want to use memory as a stack, you must mmap it with that flag bit.
Standards state a contract or implication
https://marc.info/?l=openbsd-tech&m=151233832624797&w=2 [marc.info]
2017-12-04 22:05
tags:
c
development
openbsd
programming
standard
unix
In reference to the inquiry, gettimeofday(2) does not conform to POSIX.1-2008?
Standards state a contract or implication: *if* you, the developer follow _these_ rules, *then* the standardized item will follow _these_other_ rules (if compliant). If you violate the implication, then the standard no longer applies and you have lost the guarantees of the standard.
Nice summary of the standards situation. If you color inside the lines, you get a pretty picture. If you don’t, you don’t.
OpenBSD syspatches for one release in the future.
https://marc.info/?l=openbsd-tech&m=150793229700628 [marc.info]
2017-10-15 20:46
tags:
openbsd
update
Errata patches will continue to be generated for 2 releases.
RETGUARD
https://marc.info/?l=openbsd-tech&m=150317547021396&w=2 [marc.info]
2017-08-19 21:29
tags:
beta
compiler
cpu
defense
openbsd
security
systems
The mechanism is like a userland ‘stackghost’ in the function prologue and epilogue. The preamble XOR’s the return address at top of stack with the stack pointer value itself.
Lower VM_MAX_USER_ADDRESS to finalize work-around for Ryzen bug
http://marc.info/?l=dragonfly-commits&m=150234443814532&w=2 [marc.info]
2017-08-12 18:07
tags:
bugfix
cpu
dragonfly
hardware
systems
A good summary of the bug affecting Ryzen CPUs.
Add deprecation notices for all rcmd tools
http://marc.info/?l=freebsd-commits-all&m=149918307723723&w=2 [marc.info]
2017-07-04 19:59
tags:
admin
freebsd
update
If you’re still using rcp, you should not be. At all.
KARL - kernel address randomized link
https://marc.info/?l=openbsd-tech&m=149732026405941&w=2 [marc.info]
2017-06-13 15:45
tags:
defense
openbsd
random
security
Over the last three weeks I’ve been working on a new randomization
feature which will protect the kernel.
randomize the link order of .o files in the kernel
http://marc.info/?l=openbsd-cvs&m=149625830525338&w=2 [marc.info]
2017-05-31 19:59
tags:
compiler
openbsd
random
security
As a result, the internal layout of every newly build bsd kernel is different from past kernels.
vmm(4)/vmd(8) support for seabios and linux guests
https://marc.info/?l=openbsd-tech&m=149048271705188 [marc.info]
2017-04-02 17:55
tags:
openbsd
swtools
update
virtualization
This should be enough for people to create images and help find and
fix bugs.