Return to errata33.html CVS log | Up to [local] / www |
version 1.52, 2014/03/31 03:36:54 | version 1.53, 2014/03/31 04:11:40 | ||
---|---|---|---|
|
|
||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch"> | <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch"> | ||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||
<a name="i386"></a> | |||
<li><a name="ibcs2"></a> | |||
<font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font> <i>i386 only</i><br> | |||
It is possible for a local user to execute arbitrary code resulting in escalation of | |||
privileges due to a stack overrun in | |||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&sektion=8&apropos=0&manpath=OpenBSD+Current&arch=i386">compat_ibcs2(8)</a>.<br> | |||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch"> | |||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li><a name="exec"></a> | <li><a name="exec"></a> | ||
<font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font> <i>All architectures</i><br> | <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font> <i>All architectures</i><br> | ||
It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header. | It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header. | ||
|
|
||
it is possible that this bug may allow an attacker to gain escalated privileges | it is possible that this bug may allow an attacker to gain escalated privileges | ||
on OpenBSD.<br> | on OpenBSD.<br> | ||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch"> | <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch"> | ||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
</ul> | |||
<p> | |||
<a name="i386"></a> | |||
<h3><font color="#e00000">i386</font></h3> | |||
<ul> | |||
<li><a name="ibcs2"></a> | |||
<font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font><br> | |||
It is possible for a local user to execute arbitrary code resulting in escalation of | |||
privileges due to a stack overrun in | |||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&sektion=8&apropos=0&manpath=OpenBSD+Current&arch=i386">compat_ibcs2(8)</a>.<br> | |||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch"> | |||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||
</ul> | </ul> |