-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NetBSD Security Advisory 2010-003 ================================= Topic: azalia(4)/hdaudio(4) negative mixer index panic Version: NetBSD-current: affected prior to 2010-01-21 NetBSD 5.0.*: affected NetBSD 5.0: affected NetBSD 4.0.*: affected NetBSD 4.0: affected Severity: Local system crash Fixed: NetBSD-current: Jan 21, 2010 NetBSD-5-0 branch: Jan 22, 2010 NetBSD-5 branch: Jan 22, 2010 NetBSD-4-0 branch: Jan 22, 2010 NetBSD-4 branch: Jan 22, 2010 Please note that NetBSD releases prior to 4.0 are no longer supported. It is recommended that all users upgrade to a supported release. Abstract ======== A signedness issue in the azalia(4) and hdaudio(4) drivers allows a local attacker to cause a kernel panic. Technical Details ================= The azalia_query_devinfo() function in azalia(4) and the hdaudio_afg_set_port() function in hdaudio(4) incorrectly assume the mixer index to be an unsigned integer, thus not checking for negative values. Since the mixer index number is user specified, any user with access to the mixer can cause an access to a negative array index by specifying a negative mixer number, leading to a kernel panic. In order to exploit the vulnerability, the azalia(4) or hdaudio(4) driver must be loaded and at least one azalia(4) or hdaudio(4) device must be present in the machine and configured by the kernel Solutions and Workarounds ========================= As a possible workaround, the azalia(4) and hdaudio(4) drivers can be disabled. This can be achieved either by specifying the configuration parameter at boot and disabling the device: boot> boot -c config> disable azalia config> disable hdaudio config> boot or by commenting out the relevant sections of your kernel configuration file: #azalia* at pci? dev ? function ? # High Definition Audio #hdaudio* at pci? dev ? function ? # High Definition Audio The following instructions describe how to upgrade your kernel binaries by updating your source tree and rebuilding and installing a new version of the kernel. Only kernels compiled with either of the following options are vulnerable to this issue: azalia* at pci? dev ? function ? hdaudio* at pci? dev ? function ? As a temporary workaround recompile the kernel with the above option commented out. The default NetBSD GENERIC kernels have the azalia option enabled, while hdaudio is disabled. For all NetBSD versions, you need to obtain fixed kernel sources, build, install the new kernel, and reboot the system. The fixed source may be obtained from the NetBSD CVS repository. The following instructions briefly summarise how to upgrade your kernel. In these instructions, replace: ARCH with your architecture (from uname -m), and KERNCONF with the name of your kernel configuration file. To update from CVS, build, and install the kernel: # cd src # cvs update -d -P sys/dev/pci/azalia.c # cvs update -d -P sys/dev/pci/hdaudio/hdaudio_afg.c # Except on NetBSD 4.x # ./build.sh kernel=KERNCONF # mv /netbsd /netbsd.old # cp sys/arch/ARCH/compile/obj/KERNCONF/netbsd /netbsd # shutdown -r now For more information on how to do this, see: http://www.NetBSD.org/guide/en/chap-kernel.html Thanks To ========= Pierre Pronchery for finding and reporting the vulnerability as well as providing a patch. Revision History ================ 2010-02-02 Initial release More Information ================ Advisories may be updated as new information becomes available. The most recent version of this advisory (PGP signed) can be found at http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2010-003.txt.asc Information about NetBSD and NetBSD security can be found at http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ . Copyright 2010, The NetBSD Foundation, Inc. All Rights Reserved. Redistribution permitted only in full, unmodified form. $NetBSD: NetBSD-SA2010-003.txt,v 1.1 2010/02/02 19:18:36 tonnerre Exp $ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (NetBSD) iQIcBAEBAgAGBQJLaHsAAAoJEAZJc6xMSnBuC+UQAJ5krxXjvCO/nx9uZiSg3Mj1 6aFvOn7ssEdp4ToqxsGHPBEBeOSUl/oUwrcS7LugcwVcXnCRHCl/9CnTso6PdFR4 TFG/dZXoDhyU1Q9yhE+eYFHU2xqD/qOngySyrHZtRfrcyEr53WN00FVzfkKK4H2Z A/UWGoAAp+BnWeIMMGiozzud5rnvchMN/Zsjwa0lCxy45lmS8lHK7vQm0jMaEKsV GrwejFc9gCRD6JkOz3A1sfg2Bo91/pxXcU6PZgSGrYXzQQcnyJw9zjAAqbk1A3Y3 Nh6X39aluGnuZKit2+vMYchgIv3vq1lS5y0hKHzt3jGqmL3ny5YOpwStKAxVIbWB 6GYfBZ6o6E6y/CrkIeINCQtizvfU4UXb522Si9P0Vb0sXlz34hCvkWyo8ReStAKM 2MsJha2w5dSk1ru2qmPfaIfiAru8cRLSpvnjEOOQF1Bfxfoj48Ue7jf4bljdc/IQ tg2v/OqA7mAG/sl0w3TAq6kzeGq6Y7Qm9eoOTFuPM4QVZOIr5a/rB0XYttkRw1RP /3QKpahvnB/AbpavonxmF/YosR4BM5+Ufp+Y0FmmVyWgAWR/TM77Wri3EpJbjbhy VWtVwNdjCMRlVvg2HUBHk4+k/6c3OmaxT8LYnph8r+EcdI8HotgQU5PZUJKPhmq0 pCwHOw0bwvrHhZQrzDVq =QM1W -----END PGP SIGNATURE-----