Return to errata.html CVS log | Up to [local] / www |
version 1.339, 2001/06/15 17:04:09 | version 1.340, 2001/06/15 17:13:26 | ||
---|---|---|---|
|
|
||
<a name=all></a> | <a name=all></a> | ||
<li><h3><font color=#e00000>All architectures</font></h3> | <li><h3><font color=#e00000>All architectures</font></h3> | ||
<ul> | <ul> | ||
<a name=kernexec></a> | <a name=twe></a> | ||
<li><font color=#009000><strong>008: RELIABILITY FIX: June 15, 2001</strong></font><br> | <li><font color=#009000><strong>008: RELIABILITY FIX: June 15, 2001</strong></font><br> | ||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=twe&sektion=4&format=html">twe(4)</a> | <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=twe&sektion=4&format=html">twe(4)</a> | ||
misshandling the DMA mapping results in a kernel panic on unaligned data | misshandling the DMA mapping results in a kernel panic on unaligned data | ||
|
|
||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&sektion=8&format=html">dump(8)</a> | <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&sektion=8&format=html">dump(8)</a> | ||
. | . | ||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">A source code patch exists which remedies the problem</a>. | <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">A source code patch exists which remedies the problem</a>. | ||
<p> | |||
<a name=kernexec></a> | |||
<li><font color=#009000><strong>007: SECURITY FIX: June 15, 2001</strong></font><br> | <li><font color=#009000><strong>007: SECURITY FIX: June 15, 2001</strong></font><br> | ||
A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&sektion=2&format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&sektion=2&format=html">ptrace(2)</a> attach or queue up arbitrary signals to a suid/sgid process. | A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&sektion=2&format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&sektion=2&format=html">ptrace(2)</a> attach or queue up arbitrary signals to a suid/sgid process. | ||
<br> | <br> |