Return to errata.html CVS log | Up to [local] / www |
version 1.348, 2001/08/04 18:37:37 | version 1.349, 2001/08/05 01:53:12 | ||
---|---|---|---|
|
|
||
<li><font color=#009000><strong>012: SECURITY FIX: July 30, 2001</strong></font><br> | <li><font color=#009000><strong>012: SECURITY FIX: July 30, 2001</strong></font><br> | ||
A kernel buffer overflow exists in the NFS mount code. An attacker may | A kernel buffer overflow exists in the NFS mount code. An attacker may | ||
use this overflow to execute arbitrary code in kernel mode. However, | use this overflow to execute arbitrary code in kernel mode. However, | ||
only users with | only users with <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount&sektion=2">mount(2)</a> | ||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount&sektion=2">mount</a> | |||
privileges can initiate this attack. In default installs, only super-user has | privileges can initiate this attack. In default installs, only super-user has | ||
mount privileges. The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&sektion=3">sysctl(3)</a> controls whether other users have mount privileges. | mount privileges. The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&sektion=3">sysctl(3)</a> controls whether other users have mount privileges. | ||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a> | <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a> |