[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.348 and 1.349

version 1.348, 2001/08/04 18:37:37 version 1.349, 2001/08/05 01:53:12
Line 50 
Line 50 
 <li><font color=#009000><strong>012: SECURITY FIX: July 30, 2001</strong></font><br>  <li><font color=#009000><strong>012: SECURITY FIX: July 30, 2001</strong></font><br>
 A kernel buffer overflow exists in the NFS mount code. An attacker may  A kernel buffer overflow exists in the NFS mount code. An attacker may
 use this overflow to execute arbitrary code in kernel mode. However,  use this overflow to execute arbitrary code in kernel mode. However,
 only users with  only users with <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount&sektion=2">mount(2)</a>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount&sektion=2">mount</a>  
 privileges can initiate this attack.  In default installs, only super-user has  privileges can initiate this attack.  In default installs, only super-user has
 mount privileges.  The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&sektion=3">sysctl(3)</a> controls whether other users have mount privileges.  mount privileges.  The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&sektion=3">sysctl(3)</a> controls whether other users have mount privileges.
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a>

Legend:
Removed from v.1.348  
changed lines
  Added in v.1.349