[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.317 and 1.318

version 1.317, 2001/03/18 18:18:46 version 1.318, 2001/03/19 16:37:04
Line 50 
Line 50 
 The readline library shipped with OpenBSD allows history files creation with  The readline library shipped with OpenBSD allows history files creation with
 a permissive umask.  This can lead to the leakage of sensitive information  a permissive umask.  This can lead to the leakage of sensitive information
 in applications that use passwords and the like during user interaction  in applications that use passwords and the like during user interaction
 (one such application is mysql).  (one such application is mysql).<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=ipsec_ah></a>  <a name=ipsec_ah></a>
 <li><font color=#009000><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br>  <li><font color=#009000><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br>
 Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.  Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=sudo></a>  <a name=sudo></a>
 <li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br>  <li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br>
 There is a buffer overflow in  There is a buffer overflow in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>.
 It is not currently known whether this is exploitable.  It is not currently known whether this is exploitable.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=libwrap></a>  <a name=libwrap></a>
 <li><font color=#009000><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br>  <li><font color=#009000><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br>
 Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.  Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=lepci></a>  <a name=lepci></a>

Legend:
Removed from v.1.317  
changed lines
  Added in v.1.318