Contributed by jose on from the kernel-bugs dept.
The bug has been fixed in OpenBSD-current as well as the 3.3 stable
branch. In addition, a patch is available for OpenBSD 3.3:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/002_semget.patch
Credit goes to blexim for finding and reporting the problem.
Start playing with semget(IPC_PRIVATE, -1, 0) :("
Bummer, well, time to upgrade. Thanks go to Todd Miller for the Security-Announce mail.
(Comments are closed)
By systrace () on http://cowofb0rg.org
Comments
By Anonymous Coward () on
Yet.
Comments
By Anonymous Coward () on
By Anonymous Coward () on
And besides, by the time anyone would figure out an way (if at all possible), all our boxes are patched anyway, right?
3.3 seems to be doing pretty well. Just 2 patches, and 3.4 isn't that far away anymore. 3.3 could easily become the release with the least amount of patches thusfar!
Comments
By Anonymous Coward () on
Comments
By tedu () on
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By earx () on
what u are talking about was the apache exploit not openssh.
Theo was thinking that apache was not exploitable,
and they do an exploit with a local and a remote hole.
For openssh theo didn't say it was not exploitable, because they give the remote exploit before release the patch with sometimes to fix it.
We just heard the day one about the exploit when theo gave the patch.
By tedu () on
Comments
By earx () on
http://www.deadly.org/article.php3?sid=20020622150526
Comments
By Anonymous Coward () on
Hence if I installed an OpenBSD 2.8 or event an older release and updated OpenSSH on this machine then there shouldn't bee any remote explorit on it... DON'T THINK SO!
http://www.deadly.org/article.php3?sid=20020622150526&mode=flat
this only confirms this!!!!
By tedu () on
By Me!You () on
After my opinion the claim saying: "Only one remote hole in the default install, in more than 7 years!" is not exactly true.
Now for the proof of this:
Revision 1.393 of index.html (Mon Dec 9 09:59:06 2002 UTC) more than 7 years
Revision 1.392 of index.html (Mon Nov 25 22:11:52 2002 UTC) nearly 6 years
Revision 1.379 of index.html (Sun May 19 18:51:09 2002 UTC) 5 years
Revision 1.378 of index.html (Wed May 1 16:06:14 2002 UTC) 4 years
Revision 1.331 of index.html (Sun Apr 29 01:25:12 2001 UTC) 3 years
From Dec 9 2002 to Nov 25 2002 1 year?
From Nov 25 2002 to May 19 2002 1 year?
From May 19 2002 to May 1 2002 1 year?
From Apr 29 2001 to Dec 9 2002 I roughly get 1 year and 7 month which equals 4 years after to OpenBSD team’s opinion?
Comments
By Bruno Rohée () bruno@rohee.com on mailto:bruno@rohee.com
I encourage everyone to actually see the various revisions quoted, in their entirety.
Basically as long there has not be any hole the duration increased as the time went and once there was the only remote exploit ever the duration has been taken from the start of the project.
Nothing to hide or to be ashamed of here.
Comments
By Me!You () on
Is says the following:
"Three years without a remote hole in the default install!"
Moreover is also says the following:
"Two years without a localhost hole in thedefault install!"
Why did they only say 3 years if is in fact more. There must have been a reason for this.
I would have liked it if they have continued with the number of local holes as they did for a while.
http://www.openbsd.org/cgi-bin/cvsweb/~checkout~/www/index.html?rev=1.304&content-type=text/plain
Maybe the number got to embarrassing or the simply lost track.
Comments
By Anonymous Coward () on
Comments
By Brad () on
Comments
By Anonymous Coward () on
Comments
By Brad () on
Comments
By Me!You () on
But no the only thing I get back is that I'm a flamer... thanks guys
I can only conclude from this tha the quote:
"Only one remote hole in the default install, in more than 7 years!"
is't true. Otherwise you would be able to point me to some information about why it was increased so quickly.
Comments
By tedu () on
By map-ip-to-name () nobody@localhost on http://phrack.efnet.ru/phrack/opencult/
Comments
By Me!You () on
By Anonymous Coward () on
(10 points for the first person who ignores the entire paragraph above and chooses to comment that "OpenBSD never said privilege separation was impenetrable")
The quote is:
"Only one remote hole in the default install, in more than 7 years!"
This tells us the following about OpenBSD's stance on security:
* They don't care about local/remote DoS conditions (hence why such "reliability" fixes aren't on the security page, yet every other OS seems to consider a DoS a security-related bug)
* They don't care about client-side bugs that can be exploited remotely (the ftp client bug for instance)
* They don't care about bugs that don't gain you instant root (remember apache + select)
* They don't care about exploits in programs that aren't in the default install (essentially nothing bug OpenSSH)
* They don't care about local bugs at all, since it's clearly ridiculous that anyone would want to have users on an OpenBSD server.
You can try to deny these facts all you want, but this viewpoint trickles down to the users as is clearly evident on this website.
Now ask yourself if you want a group of people who care about their own image more than the hyped-up security rip-offs they're dishing out to you to be in charge of your operating system.
I'll pass.
Comments
By tedu () on
how?
By Anonymous Coward () on
By Anonymous Coward () on
I want an explanation from Theo and/or other OpenBSD developers before I trust OpenBSD's repotation as the most secure operatingsystem... this is just some very good makrething bullshit!
Why not get Theo's and other OpenBSD developers comments for once and let this flame about this claim rest. Maybe because they can't say anything except this: "Sorry guys, this OS is not as secure as we would like it to sound it is"
Comments
By Anonymous Coward () on
markething? makrething? repotation?
Comments
By AndrewH () on
By Anonymous Coward () on