[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.339 and 1.340

version 1.339, 2001/06/15 17:04:09 version 1.340, 2001/06/15 17:13:26
Line 46 
Line 46 
 <a name=all></a>  <a name=all></a>
 <li><h3><font color=#e00000>All architectures</font></h3>  <li><h3><font color=#e00000>All architectures</font></h3>
 <ul>  <ul>
 <a name=kernexec></a>  <a name=twe></a>
 <li><font color=#009000><strong>008: RELIABILITY FIX: June 15, 2001</strong></font><br>  <li><font color=#009000><strong>008: RELIABILITY FIX: June 15, 2001</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=twe&sektion=4&format=html">twe(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=twe&sektion=4&format=html">twe(4)</a>
 misshandling the DMA mapping results in a kernel panic on unaligned data  misshandling the DMA mapping results in a kernel panic on unaligned data
Line 56 
Line 56 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&sektion=8&format=html">dump(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&sektion=8&format=html">dump(8)</a>
 .  .
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">A source code patch exists which remedies the problem</a>.  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">A source code patch exists which remedies the problem</a>.
   <p>
   <a name=kernexec></a>
 <li><font color=#009000><strong>007: SECURITY FIX: June 15, 2001</strong></font><br>  <li><font color=#009000><strong>007: SECURITY FIX: June 15, 2001</strong></font><br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&sektion=2&format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&sektion=2&format=html">ptrace(2)</a> attach or queue up arbitrary signals to a suid/sgid process.  A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&sektion=2&format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&sektion=2&format=html">ptrace(2)</a> attach or queue up arbitrary signals to a suid/sgid process.
 <br>  <br>

Legend:
Removed from v.1.339  
changed lines
  Added in v.1.340