=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata30.html,v retrieving revision 1.43 retrieving revision 1.44 diff -c -r1.43 -r1.44 *** www/errata30.html 2003/10/24 22:12:40 1.43 --- www/errata30.html 2003/11/21 16:55:16 1.44 *************** *** 8,13 **** --- 8,14 ---- +
*************** *** 51,59 **** consult the OpenBSD FAQ.!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
--- 275,297 ----
in the default installation.
!
!
!
***************
*** 316,323 ****
a source code patch exists which remedies these problems.
This is the second version of this patch.
!
!
--- 316,323 ----
a source code patch exists which remedies these problems.
This is the second version of this patch.
!
***************
*** 335,345 ****
If the Postfix sendmail replacement is installed on a system an
attacker may be able to gain root privileges on the local host via
sudo(8) which runs the mailer as root with an environment inherited
--- 229,254 ----
The feasibility of attacking the kernel this way is currently unknown.
A source code patch exists which remedies the problem.
A local user can gain super-user privileges due to an off-by-one check
in the channel forwarding code of OpenSSH.
A source code patch exists which remedies the problem.
The wrong filedescriptors are released when pipe(2) failed.
A source code patch exists which remedies the problem.
A race condition between the ptrace(2) and execve(2) system calls allows
an attacker to modify the memory contents of suid/sgid processes which
could lead to compromise of the super-user account.
A source code patch exists which remedies the problem.
If the Postfix sendmail replacement is installed on a system an
attacker may be able to gain root privileges on the local host via
sudo(8) which runs the mailer as root with an environment inherited
***************
*** 259,272 ****
invoking user.
A source code patch exists which remedies the problem.
Systems running with IP-in-IP encapsulation can be made to crash by
malformed packets.
A source code patch exists which remedies the problem.
A security issue exists in the lpd daemon that may allow an attacker
to create arbitrary new files in the root directory. Only machines
with line printer access (ie: listed in either /etc/hosts.lpd or
--- 259,272 ----
invoking user.
A source code patch exists which remedies the problem.
Systems running with IP-in-IP encapsulation can be made to crash by
malformed packets.
A source code patch exists which remedies the problem.
A security issue exists in the lpd daemon that may allow an attacker
to create arbitrary new files in the root directory. Only machines
with line printer access (ie: listed in either /etc/hosts.lpd or
***************
*** 275,297 ****
in the default installation.
A source code patch exists which remedies the problem.
A security issue exists in the vi.recover script that may allow an attacker
to remove arbitrary zero-length files, regardless of ownership.
A source code patch exists which remedies the problem.
pf(4)
was incapable of dealing with certain ipv6 icmp packets, resulting in a crash.
A source code patch exists which remedies the problem.
sshd(8)
is being upgraded from OpenSSH 3.0 to OpenSSH 3.0.2 to fix a few problems:
A source code patch exists which remedies the problem.
A security issue exists in the vi.recover script that may allow an attacker
to remove arbitrary zero-length files, regardless of ownership.
A source code patch exists which remedies the problem.
pf(4)
was incapable of dealing with certain ipv6 icmp packets, resulting in a crash.
A source code patch exists which remedies the problem.
sshd(8)
is being upgraded from OpenSSH 3.0 to OpenSSH 3.0.2 to fix a few problems:
A small bug in the installation script causes the /etc/hosts file to
be incorrectly formed.
The resulting file contains a line which reads like:
A small bug in the installation script causes the /etc/hosts file to
be incorrectly formed.
The resulting file contains a line which reads like:
boot cd:,OFWBOOT /3.0/macppc/bsd.rd
boot cd:,OFWBOOT /3.0/macppc/bsd.rd
!