version 1.317, 2001/03/18 18:18:46 |
version 1.318, 2001/03/19 16:37:04 |
|
|
The readline library shipped with OpenBSD allows history files creation with |
The readline library shipped with OpenBSD allows history files creation with |
a permissive umask. This can lead to the leakage of sensitive information |
a permissive umask. This can lead to the leakage of sensitive information |
in applications that use passwords and the like during user interaction |
in applications that use passwords and the like during user interaction |
(one such application is mysql). |
(one such application is mysql).<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=ipsec_ah></a> |
<a name=ipsec_ah></a> |
<li><font color=#009000><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br> |
<li><font color=#009000><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br> |
Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default. |
Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=sudo></a> |
<a name=sudo></a> |
<li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br> |
<li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br> |
There is a buffer overflow in |
There is a buffer overflow in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
It is not currently known whether this is exploitable. |
It is not currently known whether this is exploitable.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=libwrap></a> |
<a name=libwrap></a> |
<li><font color=#009000><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br> |
<li><font color=#009000><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br> |
Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections. |
Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=lepci></a> |
<a name=lepci></a> |