=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata30.html,v retrieving revision 1.94 retrieving revision 1.95 diff -c -r1.94 -r1.95 *** www/errata30.html 2016/08/15 02:22:06 1.94 --- www/errata30.html 2016/10/16 19:11:29 1.95 *************** *** 70,76 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

--- 70,76 ----


! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

*************** *** 94,100 **** could allow an attacker to execute code with the privileges of named. On OpenBSD, named runs as a non-root user in a chrooted environment which mitigates the effects of this bug.
! A source code patch exists which remedies this problem.

  • --- 94,100 ---- could allow an attacker to execute code with the privileges of named. On OpenBSD, named runs as a non-root user in a chrooted environment which mitigates the effects of this bug.
    ! A source code patch exists which remedies this problem.

  • *************** *** 103,109 **** Incorrect argument checking in the getrlimit(2) system call may allow an attacker to crash the kernel.
    ! A source code patch exists which remedies this problem.

  • --- 103,109 ---- Incorrect argument checking in the getrlimit(2) system call may allow an attacker to crash the kernel.
    ! A source code patch exists which remedies this problem.

  • *************** *** 112,118 **** An attacker can bypass the restrictions imposed by sendmail's restricted shell, smrsh(8), and execute arbitrary commands with the privileges of his own account.
    ! A source code patch exists which remedies this problem.

  • --- 112,118 ---- An attacker can bypass the restrictions imposed by sendmail's restricted shell, smrsh(8), and execute arbitrary commands with the privileges of his own account.
    ! A source code patch exists which remedies this problem.

  • *************** *** 121,127 **** A buffer overflow can occur in the kadmind(8) daemon, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • --- 121,127 ---- A buffer overflow can occur in the kadmind(8) daemon, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • *************** *** 129,135 ****   All architectures
    Incorrect argument checking in the setitimer(2) system call may allow an attacker to write to kernel memory.
    ! A source code patch exists which remedies this problem.

  • --- 129,135 ----   All architectures
    Incorrect argument checking in the setitimer(2) system call may allow an attacker to write to kernel memory.
    ! A source code patch exists which remedies this problem.

  • *************** *** 139,145 **** select(2) system call allows an attacker to overwrite kernel memory and execute arbitrary code in kernel context.
    ! A source code patch exists which remedies this problem.

  • --- 139,145 ---- select(2) system call allows an attacker to overwrite kernel memory and execute arbitrary code in kernel context.
    ! A source code patch exists which remedies this problem.

  • *************** *** 150,156 **** library, as in the ASN.1 parser code in the crypto(3) library, all of them being potentially remotely exploitable.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. --- 150,156 ---- library, as in the ASN.1 parser code in the crypto(3) library, all of them being potentially remotely exploitable.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. *************** *** 161,167 **** A buffer overflow can occur in the xdr_array(3) RPC code, leading to possible remote crash.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. --- 161,167 ---- A buffer overflow can occur in the xdr_array(3) RPC code, leading to possible remote crash.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. *************** *** 172,178 **** A race condition exists in the pppd(8) daemon which may cause it to alter the file permissions of an arbitrary file.
    ! A source code patch exists which remedies this problem.

  • --- 172,178 ---- A race condition exists in the pppd(8) daemon which may cause it to alter the file permissions of an arbitrary file.
    ! A source code patch exists which remedies this problem.

  • *************** *** 180,186 ****   All architectures
    Receiving IKE payloads out of sequence can cause isakmpd(8) to crash.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. --- 180,186 ----   All architectures
    Receiving IKE payloads out of sequence can cause isakmpd(8) to crash.
    ! A source code patch exists which remedies this problem.
    This is the second version of the patch. *************** *** 189,202 **** 026: SECURITY FIX: June 27, 2002   All architectures
    The kernel would let any user ktrace(2) set[ug]id processes.
    ! A source code patch exists which remedies this problem.

  • 025: SECURITY FIX: June 25, 2002   All architectures
    A potential buffer overflow in the DNS resolver has been found.
    ! A source code patch exists which remedies this problem.

  • --- 189,202 ---- 026: SECURITY FIX: June 27, 2002   All architectures
    The kernel would let any user ktrace(2) set[ug]id processes.
    ! A source code patch exists which remedies this problem.

  • 025: SECURITY FIX: June 25, 2002   All architectures
    A potential buffer overflow in the DNS resolver has been found.
    ! A source code patch exists which remedies this problem.

  • *************** *** 204,219 ****   All architectures
    All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. ! This problem is fixed in OpenSSH 3.4, and a patch for the vulnerable releases is available as part of the ! security advisory.

  • 023: SECURITY FIX: June 24, 2002   All architectures
    A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd module, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • --- 204,219 ----   All architectures
    All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. ! This problem is fixed in OpenSSH 3.4, and a patch for the vulnerable releases is available as part of the ! security advisory.

  • 023: SECURITY FIX: June 24, 2002   All architectures
    A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd module, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • *************** *** 221,227 ****   All architectures
    A buffer overflow can occur during the interpretation of chunked encoding in the http daemon, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • --- 221,227 ----   All architectures
    A buffer overflow can occur during the interpretation of chunked encoding in the http daemon, leading to possible remote crash or exploit.
    ! A source code patch exists which remedies this problem.

  • *************** *** 230,243 **** A race condition exists where an attacker could fill the file descriptor table and defeat the kernel's protection of fd slots 0, 1, and 2 for a setuid or setgid process.
    ! A source code patch exists which remedies this problem.

  • 020: SECURITY FIX: April 25, 2002   All architectures
    A bug in sudo(8) may allow an attacker to corrupt the heap by specifying a custom prompt.
    ! A source code patch exists which remedies this problem.

  • --- 230,243 ---- A race condition exists where an attacker could fill the file descriptor table and defeat the kernel's protection of fd slots 0, 1, and 2 for a setuid or setgid process.
    ! A source code patch exists which remedies this problem.

  • 020: SECURITY FIX: April 25, 2002   All architectures
    A bug in sudo(8) may allow an attacker to corrupt the heap by specifying a custom prompt.
    ! A source code patch exists which remedies this problem.

  • *************** *** 249,255 **** KerberosTgtPassing or AFSTokenPassing has been enabled in the sshd_config file. Ticket and token passing is not enabled by default.
    ! A source code patch exists which remedies this problem.

  • --- 249,255 ---- KerberosTgtPassing or AFSTokenPassing has been enabled in the sshd_config file. Ticket and token passing is not enabled by default.
    ! A source code patch exists which remedies this problem.

  • *************** *** 259,265 **** will process tilde escapes even in non-interactive mode. This can lead to a local root compromise.
    ! A source code patch exists which remedies this problem.

  • --- 259,265 ---- will process tilde escapes even in non-interactive mode. This can lead to a local root compromise.
    ! A source code patch exists which remedies this problem.

  • *************** *** 268,274 **** isakmpd(8) will crash when receiving a zero length IKE packet due to a too-late length check.
    ! A source code patch exists which remedies this problem.

  • --- 268,274 ---- isakmpd(8) will crash when receiving a zero length IKE packet due to a too-late length check.
    ! A source code patch exists which remedies this problem.

  • *************** *** 285,291 **** may change to the wrong home directory when running at(1) jobs.
    ! A source code patch exists which remedies this problem.

  • --- 285,291 ---- may change to the wrong home directory when running at(1) jobs.
    ! A source code patch exists which remedies this problem.

  • *************** *** 297,303 **** function detects this. There is also a kernel zlib component that may be used by pppd and IPsec. The feasibility of attacking the kernel this way is currently unknown.
    ! A source code patch exists which remedies this problem.

  • --- 297,303 ---- function detects this. There is also a kernel zlib component that may be used by pppd and IPsec. The feasibility of attacking the kernel this way is currently unknown.
    ! A source code patch exists which remedies this problem.

  • *************** *** 305,318 ****   All architectures
    A local user can gain super-user privileges due to an off-by-one check in the channel forwarding code of OpenSSH.
    ! A source code patch exists which remedies this problem.

  • 013: RELIABILITY FIX: February 4, 2002   All architectures
    The wrong filedescriptors are released when pipe(2) failed.
    ! A source code patch exists which remedies this problem.

  • --- 305,318 ----   All architectures
    A local user can gain super-user privileges due to an off-by-one check in the channel forwarding code of OpenSSH.
    ! A source code patch exists which remedies this problem.

  • 013: RELIABILITY FIX: February 4, 2002   All architectures
    The wrong filedescriptors are released when pipe(2) failed.
    ! A source code patch exists which remedies this problem.

  • *************** *** 321,327 **** A race condition between the ptrace(2) and execve(2) system calls allows an attacker to modify the memory contents of suid/sgid processes which could lead to compromise of the super-user account.
    ! A source code patch exists which remedies this problem.

  • --- 321,327 ---- A race condition between the ptrace(2) and execve(2) system calls allows an attacker to modify the memory contents of suid/sgid processes which could lead to compromise of the super-user account.
    ! A source code patch exists which remedies this problem.

  • *************** *** 335,341 **** ships with OpenBSD) is the mailer. As of version 1.6.5, sudo passes the mailer an environment that is not subject to influence from the invoking user.
    ! A source code patch exists which remedies this problem.

  • --- 335,341 ---- ships with OpenBSD) is the mailer. As of version 1.6.5, sudo passes the mailer an environment that is not subject to influence from the invoking user.
    ! A source code patch exists which remedies this problem.

  • *************** *** 343,349 ****   All architectures
    Systems running with IP-in-IP encapsulation can be made to crash by malformed packets.
    ! A source code patch exists which remedies this problem.

  • --- 343,349 ----   All architectures
    Systems running with IP-in-IP encapsulation can be made to crash by malformed packets.
    ! A source code patch exists which remedies this problem.

  • *************** *** 365,371 **** /etc/hosts.equiv) may be used to mount an attack and the attacker must have root access on the machine. OpenBSD does not start lpd in the default installation.
    ! A source code patch exists which remedies this problem.

  • --- 365,371 ---- /etc/hosts.equiv) may be used to mount an attack and the attacker must have root access on the machine. OpenBSD does not start lpd in the default installation.
    ! A source code patch exists which remedies this problem.

  • *************** *** 374,380 **** A security issue exists in the vi.recover script that may allow an attacker to remove arbitrary zero-length files, regardless of ownership.
    ! A source code patch exists which remedies this problem.

  • --- 374,380 ---- A security issue exists in the vi.recover script that may allow an attacker to remove arbitrary zero-length files, regardless of ownership.
    ! A source code patch exists which remedies this problem.

  • *************** *** 383,389 **** pf(4) was incapable of dealing with certain ipv6 icmp packets, resulting in a crash.
    ! A source code patch exists which remedies this problem.

  • --- 383,389 ---- pf(4) was incapable of dealing with certain ipv6 icmp packets, resulting in a crash.
    ! A source code patch exists which remedies this problem.

  • *************** *** 391,397 ****
    Execution of Altivec instructions will crash the kernel.
    ! A source code patch exists which remedies this problem.

  • --- 391,397 ----
    Execution of Altivec instructions will crash the kernel.
    ! A source code patch exists which remedies this problem.

  • *************** *** 400,406 **** Hifn7751 based cards may stop working on certain motherboards due to DMA errors.
    ! A source code patch exists which remedies this problem.

  • --- 400,406 ---- Hifn7751 based cards may stop working on certain motherboards due to DMA errors.
    ! A source code patch exists which remedies this problem.

  • *************** *** 409,415 **** Access to a CD drive on the PCI ultrasparc machines results in a continuous stream of bogus interrupt messages, causing great user anguish.
    ! A source code patch exists which remedies this problem.

  • --- 409,415 ---- Access to a CD drive on the PCI ultrasparc machines results in a continuous stream of bogus interrupt messages, causing great user anguish.
    ! A source code patch exists which remedies this problem.

  • *************** *** 436,442 ****

    Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.2. ! A source code patch exists which remedies this problem. This is the second version of this patch.

    --- 436,442 ----

    Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.2. ! A source code patch exists which remedies this problem. This is the second version of this patch.