[BACK]Return to errata33.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata33.html between version 1.52 and 1.53

version 1.52, 2014/03/31 03:36:54 version 1.53, 2014/03/31 04:11:40
Line 185 
Line 185 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   <a name="i386"></a>
   <li><a name="ibcs2"></a>
   <font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font> &nbsp; <i>i386 only</i><br>
   It is possible for a local user to execute arbitrary code resulting in escalation of
   privileges due to a stack overrun in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">
   A source code patch exists which remedies this problem.</a>
   <p>
 <li><a name="exec"></a>  <li><a name="exec"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font> &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
Line 269 
Line 278 
 it is possible that this bug may allow an attacker to gain escalated privileges  it is possible that this bug may allow an attacker to gain escalated privileges
 on OpenBSD.<br>  on OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch">
 A source code patch exists which remedies this problem.</a>  
 <p>  
 </ul>  
 <p>  
 <a name="i386"></a>  
 <h3><font color="#e00000">i386</font></h3>  
 <ul>  
 <li><a name="ibcs2"></a>  
 <font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font><br>  
 It is possible for a local user to execute arbitrary code resulting in escalation of  
 privileges due to a stack overrun in  
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>  
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">  
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>

Legend:
Removed from v.1.52  
changed lines
  Added in v.1.53