From owner-freebsd-virtualization@FreeBSD.ORG Fri Nov 21 10:52:14 2014 Return-Path: Delivered-To: freebsd-virtualization@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8BBA38F7; Fri, 21 Nov 2014 10:52:14 +0000 (UTC) Received: from mx1.sbone.de (bird.sbone.de [46.4.1.90]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 3E7EFD54; Fri, 21 Nov 2014 10:52:13 +0000 (UTC) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id C817425D3AB1; Fri, 21 Nov 2014 10:52:10 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id 0511FC76FCE; Fri, 21 Nov 2014 10:52:10 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id S2Zsv9uDAm70; Fri, 21 Nov 2014 10:52:08 +0000 (UTC) Received: from [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6] (orange-tun0-ula.sbone.de [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 3AD78C76FE0; Fri, 21 Nov 2014 10:52:06 +0000 (UTC) Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\)) Subject: Re: VIMAGE + pf security fix? From: "Bjoern A. Zeeb" In-Reply-To: Date: Fri, 21 Nov 2014 10:52:05 +0000 Content-Transfer-Encoding: quoted-printable Message-Id: References: To: Craig Rodrigues X-Mailer: Apple Mail (2.1878.6) Cc: FreeBSD Net , "freebsd-virtualization@freebsd.org" , freebsd-arch X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Nov 2014 10:52:14 -0000 On 21 Nov 2014, at 08:06 , Craig Rodrigues wrote: > On Thu, Nov 20, 2014 at 10:07 AM, Craig Rodrigues = > wrote: >=20 >> On Wed, Nov 19, 2014 at 6:05 AM, Bjoern A. Zeeb = wrote: >>=20 >>>=20 >>> For people to use pf with VIMAGE we first MUST have the security fix >>> imported that I pointed out a couple of times in the past. >>>=20 >>=20 >> At this link: = http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2010-3830 >>=20 >> I see the security issue mentioned, but I can't find the patch that = fixes >> the problem. >> Where is the patch? >>=20 >=20 > I read this link: > = http://esec-lab.sogeti.com/post/2010/12/09/CVE-2010-3830-iOS-4.2.1-packet-= filter-local-kernel-vulnerability >=20 > and I think this is the fix: > = http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_ioctl.c?rev=3D1.23= 6&content-type=3Dtext/x-cvsweb-markup >=20 > but I can=92t even apply that patch to our pf_ioctl.c. to my best knowledge we have never pulled a fix for this in. The last = =93sync=94 of pf was way before that vulnerability (unless I completely = missed something). =97=20 Bjoern A. Zeeb "Come on. Learn, goddamn it.", WarGames, 1983