[BACK]Return to errata28.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata28.html between version 1.76 and 1.77

version 1.76, 2016/02/20 14:18:42 version 1.77, 2016/03/21 05:46:19
Line 85 
Line 85 
 <li id="uucp">  <li id="uucp">
 <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=uuxqt&amp;sektion=8">uuxqt(8)</a>  A security hole exists in <a href="http://man.openbsd.org?query=uuxqt&amp;sektion=8">uuxqt(8)</a>
 that may allow an attacker to run arbitrary commands as user uucp and  that may allow an attacker to run arbitrary commands as user uucp and
 use this to gain root access.  use this to gain root access.
 The UUCP execution daemon, uuxqt(8), has a bug in its command line  The UUCP execution daemon, uuxqt(8), has a bug in its command line
Line 99 
Line 99 
 <li id="lpd">  <li id="lpd">
 <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font>  <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lpd&amp;sektion=8">lpd(8)</a>  A security hole exists in <a href="http://man.openbsd.org?query=lpd&amp;sektion=8">lpd(8)</a>
 that may allow an attacker with line printer access to gain root  that may allow an attacker with line printer access to gain root
 privileges.  A machine must be running lpd to be vulnerable (OpenBSD  privileges.  A machine must be running lpd to be vulnerable (OpenBSD
 does not start lpd by default).  Only machines with line printer  does not start lpd by default).  Only machines with line printer
Line 112 
Line 112 
 <li id="sendmail2">  <li id="sendmail2">
 <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>  A security hole exists in <a href="http://man.openbsd.org?query=sendmail&amp;sektion=8">sendmail(8)</a>
 that may allow an attacker on the local host to gain root privileges by  that may allow an attacker on the local host to gain root privileges by
 specifying out-of-bounds debug parameters.  specifying out-of-bounds debug parameters.
 <br>  <br>
Line 122 
Line 122 
 <li id="kernexec">  <li id="kernexec">
 <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.  A race condition exists in the kernel <a href="http://man.openbsd.org?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://man.openbsd.org?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 130 
Line 130 
 <li id="fts">  <li id="fts">
 <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Programs using the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>  Programs using the <a href="http://man.openbsd.org?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>
 routines (such as rm, find, and most programs that take a <b>-R</b>  routines (such as rm, find, and most programs that take a <b>-R</b>
 flag) can be tricked into changing into the wrong directory if the  flag) can be tricked into changing into the wrong directory if the
 parent dir is changed out from underneath it.  This is similar to  parent dir is changed out from underneath it.  This is similar to
Line 143 
Line 143 
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The signal handlers in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sen  The signal handlers in <a href="http://man.openbsd.org?query=sen
 dmail&amp;sektion=8&amp;format=html">sendmail(8)</a> contain code that is unsafe in the  dmail&amp;sektion=8&amp;format=html">sendmail(8)</a> contain code that is unsafe in the
 context of a signal handler.  This leads to potentially serious  context of a signal handler.  This leads to potentially serious
 race conditions.  At the moment this is a theoretical attack only  race conditions.  At the moment this is a theoretical attack only
Line 162 
Line 162 
 <li id="glob_limit">  <li id="glob_limit">
 <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>  <a href="http://man.openbsd.org?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://man.openbsd.org?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="glob">  <li id="glob">
 <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>  <a href="http://man.openbsd.org?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
Line 178 
Line 178 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
 with a permissive  with a permissive
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.  <a href="http://man.openbsd.org?query=umask&amp;sektion=2">umask(2)</a>.
 This can lead to the leakage of sensitive information in applications  This can lead to the leakage of sensitive information in applications
 that use passwords and the like during user interaction (one such  that use passwords and the like during user interaction (one such
 application is mysql).<br>  application is mysql).<br>
Line 202 
Line 202 
 <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.  <a href="http://man.openbsd.org?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 210 
Line 210 
 <li id="libwrap">  <li id="libwrap">
 <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font>  <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>  Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://man.openbsd.org?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="lepci">  <li id="lepci">
 <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font>  <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>  Fix memory allocation in the PCI LANCE driver, <a href="http://man.openbsd.org?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="named">  <li id="named">
 <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>  Merge <a href="http://man.openbsd.org?query=named&amp;sektion=8">named</a>
 with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears  with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears
 that these were already impossible to exploit beforehand).<br>  that these were already impossible to exploit beforehand).<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">
Line 233 
Line 233 
 <li id="rnd">  <li id="rnd">
 <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>  The <a href="http://man.openbsd.org?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
Line 273 
Line 273 
 <li id="procfs">  <li id="procfs">
 <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>  <a href="http://man.openbsd.org?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>

Legend:
Removed from v.1.76  
changed lines
  Added in v.1.77