version 1.9, 2015/04/30 19:45:14 |
version 1.10, 2015/04/30 19:49:23 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="006_elf"> |
|
<font color="#009000"><strong>022: SECURITY FIX: April 30, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
Malformed binaries could trigger kernel panics or view kernel memory. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/006_elf.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="007_tar"> |
|
<font color="#009000"><strong>022: SECURITY FIX: April 30, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
Multiple issues in tar/pax/cpio: |
|
<ul> |
|
<li>extracting a malicious archive could create files outside of |
|
the current directory without using pre-existing symlinks to 'escape', |
|
and could change the timestamps and modes on preexisting files |
|
<li>tar without -P would permit extraction of paths with ".." components |
|
<li>there was a buffer overflow in the handling of pax extension headers |
|
</ul> |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/007_tar.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |