version 1.346, 2001/07/16 10:36:50 |
version 1.347, 2001/07/30 23:10:43 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=nfs> |
|
<li><font color=#009000><strong>012: SECURITY FIX: July 30, 2001</strong></font><br> |
|
A kernel buffer overflow exists in the NFS mount code. An attacker may |
|
use this overflow to execute arbitrary code in kernel mode. However, |
|
only users with |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount&sektion=2">mount</a> |
|
privileges can initiate this attack. In default installs, only super-user has |
|
mount privileges. The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&sektion=3">sysctl</a> controls whether other users have mount privileges. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a> |
|
<p> |
<a name=pkg></a> |
<a name=pkg></a> |
<li><font color=#009000><strong>011: RELIABILITY FIX: July 15, 2001</strong></font> |
<li><font color=#009000><strong>011: RELIABILITY FIX: July 15, 2001</strong></font> |
<br> |
<br> |