Contributed by rueda on from the patch now! dept.
In response to the DEF CON presentation by Ilja van Sprundel, a large set of kernel patches have been released (for OpenBSD 6.0 and 6.1). These important patches should be applied ASAP!
From the announce@ mailing list:
Errata patches for a number of kernel issues have been released for OpenBSD 6.1 and 6.0.
A SIGIO-related use-after-free can occur in two drivers. A missing length check in sendsyslog() may result in a kernel panic. An out-of-bound read in vfs_getcwd_scandir() (mainly used for FUSE) may result in a kernel panic or info leak. An alignment issue in recv() may result in an info leak via ktrace(). With an invalid address family, tcp_usrreq() may take an unintended code path. Missing socket address validation from userland may result in an info leak. An uninitialized variable in ptrace() may result in an info leak. An uninitialized variable in fcntl() may result in an info leak. An integer overflow in wsdisplay_cfg_ioctl() may result in an out-of-bound read. A race condition in sosplice() may result in a kernel memory leak. An out-of-bound read could occur during processing of EAPOL frames in the wireless stack. Information from kernel memory could be leaked to root in userland via an ieee80211(9) ioctl. Binary updates for the amd64 and i386 platforms are available via the syspatch utility. Source code patches can be found on the respective errata pages: https://www.openbsd.org/errata60.html https://www.openbsd.org/errata61.html As these affect the kernel, a reboot will be needed after patching.
(Comments are closed)