diff --git a/404.html b/404.html index 7fab041..c94b5f5 100644 --- a/404.html +++ b/404.html @@ -256,6 +256,100 @@ + + + + + + + + + + + + + + + + + + + + + +
  • + + + + + + + + + + + + + +
  • + diff --git a/index.html b/index.html index 765c624..afb052c 100644 --- a/index.html +++ b/index.html @@ -14,6 +14,8 @@ + + @@ -351,19 +353,6 @@ Override packages (currently only for EL9) - - @@ -405,6 +394,100 @@ + + + + + + + + + + + + + + + + + + + + + +
  • + + + + + + + + + + + + + +
  • + @@ -458,14 +541,11 @@

    Override packages (currently only for EL9)

    -

    The changes are described in more detail in the package changelogs. +

    The changes are described in more detail on the per-package wiki pages linked above, as well as in the package changelogs. More packages/changes are planned, including override packages also for EL8.

    -

    Known-effective vulnerability mitigations and fixes

    -

    glibc-2.34-60.el9_2.security.0.2 (specifically the .0.2 version!) includes mitigations sufficient to avoid security exposure of CVE-2023-4911 and a backport of upstream glibc fix of CVE-2023-4527 that was not yet in upstream EL.

    -

    The inclusion of additional security fixes will be "reverted" if and when those get included in upstream EL packages that we rebase our changes on.

    Source code

    Just like for other Rocky Linux SIGs, the source trees for Security SIG packages are maintained in per-package git repositories. Each repository contains branches r8 and/or r9 corresponding to target EL version.

    Contributing

    @@ -484,6 +564,14 @@ More packages/changes are planned, including override packages also for EL8.

    +Fredrik Nyström +@nscfreny + + +Louis Abel +@label + + Neil Hanlon @neil diff --git a/packages/glibc/index.html b/packages/glibc/index.html new file mode 100644 index 0000000..f6e70bb --- /dev/null +++ b/packages/glibc/index.html @@ -0,0 +1,598 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + Override package: glibc - SIG/Security Wiki + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + + + + Skip to content + + +
    +
    + +
    + + + + + + +
    + + +
    + +
    + + + + + + +
    +
    + + + +
    +
    +
    + + + + + + + +
    +
    +
    + + + + +
    +
    + + + + + + + + + + + + +

    Override package: glibc

    +

    EL9

    +
      +
    • Version 2.34-60.7.el9_2.security.0.3
    • +
    • Based on 2.34-60.el9_2.7
    • +
    +

    Changes summary

    +
      +
    • Distrust and/or unset many more environment variables used by current and previous glibc versions when running SUID/SGID/setcap (Owl via ALT Linux)
    • +
    • When syslog(3)/vsyslog(3) is called by a SUID/SGID/setcap program without a preceding call to openlog(3), don't blindly trust __progname for the syslog ident (Owl via ALT Linux)
    • +
    • In syslog(3)/vsyslog(3) use asctime_r(3)+localtime_r(3) instead of strftime_r() so that month names don't depend on current locale settings (Owl via ALT Linux)
    • +
    • In asprintf(3)/vasprintf(3) reset the pointer to NULL on error, like BSDs do, so that the caller wouldn't access memory over an uninitialized or stale pointer (ALT Linux)
    • +
    • In fread(3)/fwrite(3) check for potential integer overflow (ALT Linux)
    • +
    • In tmpfile(3) use the TMPDIR environment variable (when not running SUID/SGID/setcap) (ALT Linux)
    • +
    +

    Known-effective vulnerability mitigations and fixes

    +

    2.34-60.el9_2.security.0.2 included mitigations sufficient to avoid security exposure of CVE-2023-4911 and a backport of upstream glibc fix of CVE-2023-4527 that was not yet in upstream EL. In the update to 2.34-60.7.el9_2.security.0.3, we retained the mitigations while rebasing on upstream EL's package with upstream fixes for these vulnerabilities (and more).

    +

    In general, inclusion of additional security fixes will be "reverted" if and when those get included in upstream EL packages that we rebase our changes on.

    +

    Change log

    +
    * Fri Oct  6 2023 Solar Designer <solar@openwall.com> - 2.34-60.7.el9.security.0.3
    +- Rebase on 2.34-60.7, drop "our" CVE-2023-4527 patch in favor of RH's
    +
    +* Mon Sep 25 2023 Florian Weimer <fweimer@redhat.com> - 2.34-60.7
    +- Fix memory leak regression in getaddrinfo (RHEL-2425)
    +
    +* Tue Sep 19 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.6
    +- CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-2999)
    +
    +* Tue Sep 19 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.5
    +- Revert: Always call destructors in reverse constructor order (RHEL-3385)
    +
    +* Mon Sep 18 2023 Siddhesh Poyarekar <siddhesh@redhat.com> - 2.34-60.4
    +- CVE-2023-4806 glibc: potential use-after-free in getaddrinfo (RHEL-2425)
    +
    +* Fri Sep 15 2023 Siddhesh Poyarekar <siddhesh@redhat.com> - 2.34-60.3
    +- CVE-2023-4813: potential use-after-free in gaih_inet (RHEL-2437)
    +
    +* Fri Sep 15 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.2
    +- CVE-2023-4527: Stack read overflow in getaddrinfo in no-aaaa mode (#2234715)
    +
    +* Wed Sep 13 2023 Florian Weimer <fweimer@redhat.com> - 2.34-60.1
    +- Always call destructors in reverse constructor order (RHEL-3385)
    +
    +* Mon Oct  2 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.2
    +- Add glibc-owl-alt-sanitize-env.patch stitched from several ALT Linux commits
    +  as none of their revisions matched this package's set of backports as-is
    +- Add glibc-upstream-no-aaaa-CVE-2023-4527.patch based on upstream commit
    +  bd77dd7e73e3530203be1c52c8a29d08270cb25d fixing
    +  CVE-2023-4527: Stack read overflow with large TCP responses in no-aaaa mode
    +
    +* Tue Sep 26 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.1
    +- Revise the texinfo documentation edit of glibc-2.34-alt-asprintf.patch via
    +  glibc-2.34-rocky-asprintf.patch
    +
    +* Sat Sep 23 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.0
    +- Add some of the patches from ALT Linux as of when they were at 2.34:
    +  https://git.altlinux.org/gears/g/glibc.git
    +  git show 5fa32fb0f8509f4b2b1105d71b45966dfbadc099 > glibc-2.34-alt-tmpfile.patch
    +  git show f97e5d60a6a4c9cb64e3b9ee6f5113969cf07d87 > glibc-2.34-alt-asprintf.patch
    +  git show cd45d0f74560325cc48aedb9f56881270ab3dfab > glibc-2.34-alt-libio-bound.patch
    +  git show 436eb1017c04aee3a553c2868d00a4b046e5e394 > glibc-2.34-owl-alt-syslog-ident.patch
    +  git show 03a86c234873723c26b7e387c498c1332c223968 > glibc-2.34-mjt-owl-alt-syslog-timestamp.patch
    +
    + +
    +
    + + + Last update: + October 13, 2023 + + + +
    + + + + + + +
    +
    + + +
    + + + +
    + + + +
    +
    +
    +
    + + + + + + + + + + \ No newline at end of file diff --git a/packages/openssh/index.html b/packages/openssh/index.html new file mode 100644 index 0000000..92a5cc9 --- /dev/null +++ b/packages/openssh/index.html @@ -0,0 +1,540 @@ + + + + + + + + + + + + + + + + + + + + + + + + + Override package: openssh - SIG/Security Wiki + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + + + + Skip to content + + +
    +
    + +
    + + + + + + +
    + + +
    + +
    + + + + + + +
    +
    + + + +
    +
    +
    + + + + + + + +
    +
    +
    + + + + +
    +
    + + + + + + + + + + + + +

    Override package: openssh

    +

    EL9

    +
      +
    • Version 8.7p1-30.el9_2.security.0.2
    • +
    • Based on 8.7p1-30.el9_2
    • +
    +

    Changes summary

    +
      +
    • Instead of linking against libsystemd, load it dynamically in a temporary child process to avoid polluting actual sshd's address space with that library and its many dependencies (shortens ldd sshd output from 28 to 20 lines)
    • +
    +

    Change log

    +
    * Sat Oct 07 2023 Solar Designer <solar@openwall.com> 8.7p1-30.el9.security.0.2
    +- Load libsystemd.so.0, not libsystemd.so, as the latter is only provided by
    +  systemd-devel
    +
    +* Mon Aug 28 2023 Solar Designer <solar@openwall.com> 8.7p1-30.el9.security.0.1
    +- Instead of linking against libsystemd, load it dynamically in a temporary
    +  child process to avoid polluting actual sshd's address space with that
    +  library and its many dependencies (shortens "ldd sshd" from 28 to 20 lines)
    +
    + +
    +
    + + + Last update: + October 13, 2023 + + + +
    + + + + + + +
    +
    + + +
    + + + +
    + + + +
    +
    +
    +
    + + + + + + + + + + \ No newline at end of file diff --git a/search/search_index.json b/search/search_index.json index 2180727..f91fd1e 100644 --- a/search/search_index.json +++ b/search/search_index.json @@ -1 +1 @@ -{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"]},"docs":[{"location":"","title":"SIG/Security Wiki","text":"

    The Security SIG repositories provide extra security-related packages and security-hardened override packages (replacing those from the main distribution) for Rocky Linux and other Enterprise Linux (EL) distributions.

    "},{"location":"#responsibilities","title":"Responsibilities","text":"

    Developing and maintaining various security related packages that are not in upstream EL. Identifying, developing, and maintaining security hardening changes relative to upstream EL packages. Occasionally including/backporting additional security fixes that are not yet in upstream EL packages. Contributing to the respective upstreams where practical.

    "},{"location":"#repo-installation","title":"Repo Installation","text":""},{"location":"#on-rocky-linux","title":"On Rocky Linux","text":"
    dnf install rocky-release-security\n
    "},{"location":"#on-another-compatible-el-distro","title":"On another compatible EL distro","text":"

    Download the release package containing our repository configuration file and package signing public key. Use the version that corresponds to the major version of your EL distro.

    Verify the package file's SHA-256 digest with sha256sum. The currently expected digests are:

    8daf0934c8b5cfce1f5c2dc53ea0118102940bf307c7cc8863ab718696863da6  rocky-release-security-9-2.el9.noarch.rpm\n15aebef7257d4ff3c59a3b4e45acf8fae9894a10ddd2c924dfd521033337e96c  rocky-release-security-8-2.el8.noarch.rpm\n

    This isn't as secure as checking the package signature would be if you previously had our package signing public key, but on another distro you probably don't have that yet, so checking the digest against its copy obtained from this separate website is a best-effort measure.

    Install the package with rpm -U --nodeps. The --nodeps option is needed to bypass the dependency check on our rocky-release package. In essense, you're manually confirming to rpm that you're installing on a compatible distro.

    "},{"location":"#packages","title":"Packages","text":""},{"location":"#extra-packages-for-el8-and-el9","title":"Extra packages (for EL8 and EL9)","text":""},{"location":"#override-packages-currently-only-for-el9","title":"Override packages (currently only for EL9)","text":"

    The changes are described in more detail in the package changelogs. More packages/changes are planned, including override packages also for EL8.

    "},{"location":"#known-effective-vulnerability-mitigations-and-fixes","title":"Known-effective vulnerability mitigations and fixes","text":"

    glibc-2.34-60.el9_2.security.0.2 (specifically the .0.2 version!) includes mitigations sufficient to avoid security exposure of CVE-2023-4911 and a backport of upstream glibc fix of CVE-2023-4527 that was not yet in upstream EL.

    The inclusion of additional security fixes will be \"reverted\" if and when those get included in upstream EL packages that we rebase our changes on.

    "},{"location":"#source-code","title":"Source code","text":"

    Just like for other Rocky Linux SIGs, the source trees for Security SIG packages are maintained in per-package git repositories. Each repository contains branches r8 and/or r9 corresponding to target EL version.

    "},{"location":"#contributing","title":"Contributing","text":"

    If anyone else wants to join this effort - in any capacity including development, maintenance, testing, documentation, user support, spreading the word, or something else - please join the Mattermost channel below and let us know!

    We also welcome well-reasoned suggestions/feedback/preferences on direction we should take (e.g., only making changes on top of EL's vs. offering newer upstream versions), what else to package, and what other changes to include.

    "},{"location":"#meetings-communications","title":"Meetings / Communications","text":"

    We hang out in our Security Mattermost channel.

    "},{"location":"#members","title":"Members","text":"

    Some of the people particularly active with setting up this SIG so far:

    Name Mattermost Name Neil Hanlon @neil Scott Shinn @atomicturtle Solar Designer @solardiz"}]} \ No newline at end of file +{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"]},"docs":[{"location":"","title":"SIG/Security Wiki","text":"

    The Security SIG repositories provide extra security-related packages and security-hardened override packages (replacing those from the main distribution) for Rocky Linux and other Enterprise Linux (EL) distributions.

    "},{"location":"#responsibilities","title":"Responsibilities","text":"

    Developing and maintaining various security related packages that are not in upstream EL. Identifying, developing, and maintaining security hardening changes relative to upstream EL packages. Occasionally including/backporting additional security fixes that are not yet in upstream EL packages. Contributing to the respective upstreams where practical.

    "},{"location":"#repo-installation","title":"Repo Installation","text":""},{"location":"#on-rocky-linux","title":"On Rocky Linux","text":"
    dnf install rocky-release-security\n
    "},{"location":"#on-another-compatible-el-distro","title":"On another compatible EL distro","text":"

    Download the release package containing our repository configuration file and package signing public key. Use the version that corresponds to the major version of your EL distro.

    Verify the package file's SHA-256 digest with sha256sum. The currently expected digests are:

    8daf0934c8b5cfce1f5c2dc53ea0118102940bf307c7cc8863ab718696863da6  rocky-release-security-9-2.el9.noarch.rpm\n15aebef7257d4ff3c59a3b4e45acf8fae9894a10ddd2c924dfd521033337e96c  rocky-release-security-8-2.el8.noarch.rpm\n

    This isn't as secure as checking the package signature would be if you previously had our package signing public key, but on another distro you probably don't have that yet, so checking the digest against its copy obtained from this separate website is a best-effort measure.

    Install the package with rpm -U --nodeps. The --nodeps option is needed to bypass the dependency check on our rocky-release package. In essense, you're manually confirming to rpm that you're installing on a compatible distro.

    "},{"location":"#packages","title":"Packages","text":""},{"location":"#extra-packages-for-el8-and-el9","title":"Extra packages (for EL8 and EL9)","text":""},{"location":"#override-packages-currently-only-for-el9","title":"Override packages (currently only for EL9)","text":"

    The changes are described in more detail on the per-package wiki pages linked above, as well as in the package changelogs. More packages/changes are planned, including override packages also for EL8.

    "},{"location":"#source-code","title":"Source code","text":"

    Just like for other Rocky Linux SIGs, the source trees for Security SIG packages are maintained in per-package git repositories. Each repository contains branches r8 and/or r9 corresponding to target EL version.

    "},{"location":"#contributing","title":"Contributing","text":"

    If anyone else wants to join this effort - in any capacity including development, maintenance, testing, documentation, user support, spreading the word, or something else - please join the Mattermost channel below and let us know!

    We also welcome well-reasoned suggestions/feedback/preferences on direction we should take (e.g., only making changes on top of EL's vs. offering newer upstream versions), what else to package, and what other changes to include.

    "},{"location":"#meetings-communications","title":"Meetings / Communications","text":"

    We hang out in our Security Mattermost channel.

    "},{"location":"#members","title":"Members","text":"

    Some of the people particularly active with setting up this SIG so far:

    Name Mattermost Name Fredrik Nystr\u00f6m @nscfreny Louis Abel @label Neil Hanlon @neil Scott Shinn @atomicturtle Solar Designer @solardiz"},{"location":"packages/glibc/","title":"Override package: glibc","text":""},{"location":"packages/glibc/#el9","title":"EL9","text":""},{"location":"packages/glibc/#changes-summary","title":"Changes summary","text":""},{"location":"packages/glibc/#known-effective-vulnerability-mitigations-and-fixes","title":"Known-effective vulnerability mitigations and fixes","text":"

    2.34-60.el9_2.security.0.2 included mitigations sufficient to avoid security exposure of CVE-2023-4911 and a backport of upstream glibc fix of CVE-2023-4527 that was not yet in upstream EL. In the update to 2.34-60.7.el9_2.security.0.3, we retained the mitigations while rebasing on upstream EL's package with upstream fixes for these vulnerabilities (and more).

    In general, inclusion of additional security fixes will be \"reverted\" if and when those get included in upstream EL packages that we rebase our changes on.

    "},{"location":"packages/glibc/#change-log","title":"Change log","text":"
    * Fri Oct  6 2023 Solar Designer <solar@openwall.com> - 2.34-60.7.el9.security.0.3\n- Rebase on 2.34-60.7, drop \"our\" CVE-2023-4527 patch in favor of RH's\n\n* Mon Sep 25 2023 Florian Weimer <fweimer@redhat.com> - 2.34-60.7\n- Fix memory leak regression in getaddrinfo (RHEL-2425)\n\n* Tue Sep 19 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.6\n- CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-2999)\n\n* Tue Sep 19 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.5\n- Revert: Always call destructors in reverse constructor order (RHEL-3385)\n\n* Mon Sep 18 2023 Siddhesh Poyarekar <siddhesh@redhat.com> - 2.34-60.4\n- CVE-2023-4806 glibc: potential use-after-free in getaddrinfo (RHEL-2425)\n\n* Fri Sep 15 2023 Siddhesh Poyarekar <siddhesh@redhat.com> - 2.34-60.3\n- CVE-2023-4813: potential use-after-free in gaih_inet (RHEL-2437)\n\n* Fri Sep 15 2023 Carlos O'Donell <carlos@redhat.com> - 2.34-60.2\n- CVE-2023-4527: Stack read overflow in getaddrinfo in no-aaaa mode (#2234715)\n\n* Wed Sep 13 2023 Florian Weimer <fweimer@redhat.com> - 2.34-60.1\n- Always call destructors in reverse constructor order (RHEL-3385)\n\n* Mon Oct  2 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.2\n- Add glibc-owl-alt-sanitize-env.patch stitched from several ALT Linux commits\n  as none of their revisions matched this package's set of backports as-is\n- Add glibc-upstream-no-aaaa-CVE-2023-4527.patch based on upstream commit\n  bd77dd7e73e3530203be1c52c8a29d08270cb25d fixing\n  CVE-2023-4527: Stack read overflow with large TCP responses in no-aaaa mode\n\n* Tue Sep 26 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.1\n- Revise the texinfo documentation edit of glibc-2.34-alt-asprintf.patch via\n  glibc-2.34-rocky-asprintf.patch\n\n* Sat Sep 23 2023 Solar Designer <solar@openwall.com> - 2.34-60.el9.security.0.0\n- Add some of the patches from ALT Linux as of when they were at 2.34:\n  https://git.altlinux.org/gears/g/glibc.git\n  git show 5fa32fb0f8509f4b2b1105d71b45966dfbadc099 > glibc-2.34-alt-tmpfile.patch\n  git show f97e5d60a6a4c9cb64e3b9ee6f5113969cf07d87 > glibc-2.34-alt-asprintf.patch\n  git show cd45d0f74560325cc48aedb9f56881270ab3dfab > glibc-2.34-alt-libio-bound.patch\n  git show 436eb1017c04aee3a553c2868d00a4b046e5e394 > glibc-2.34-owl-alt-syslog-ident.patch\n  git show 03a86c234873723c26b7e387c498c1332c223968 > glibc-2.34-mjt-owl-alt-syslog-timestamp.patch\n
    "},{"location":"packages/openssh/","title":"Override package: openssh","text":""},{"location":"packages/openssh/#el9","title":"EL9","text":""},{"location":"packages/openssh/#changes-summary","title":"Changes summary","text":""},{"location":"packages/openssh/#change-log","title":"Change log","text":"
    * Sat Oct 07 2023 Solar Designer <solar@openwall.com> 8.7p1-30.el9.security.0.2\n- Load libsystemd.so.0, not libsystemd.so, as the latter is only provided by\n  systemd-devel\n\n* Mon Aug 28 2023 Solar Designer <solar@openwall.com> 8.7p1-30.el9.security.0.1\n- Instead of linking against libsystemd, load it dynamically in a temporary\n  child process to avoid polluting actual sshd's address space with that\n  library and its many dependencies (shortens \"ldd sshd\" from 28 to 20 lines)\n
    "}]} \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml index 5de4c10..1b9ac5c 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -5,4 +5,14 @@ 2023-10-13 daily + + https://sig-security.rocky.page/packages/glibc/ + 2023-10-13 + daily + + + https://sig-security.rocky.page/packages/openssh/ + 2023-10-13 + daily + \ No newline at end of file diff --git a/sitemap.xml.gz b/sitemap.xml.gz index 8230e51..ac70368 100644 Binary files a/sitemap.xml.gz and b/sitemap.xml.gz differ