Er is een bug gevonden in de procfs implementatie van OpenBSD, hieronder de melding:
Bron: [url=http://www.openbsd.org/security.html#35]Security announcement[/url]
[quote]
]Incorrect bounds checking in several procfs functions could allow an
unprivileged malicious user to read arbitrary kernel memory, with the
potential to use this information to escalate privilege. OpenBSD does not
mount the proc filesystem by default, and we continue to recommend against
its use.
The cvs -stable branches have been updated to contain a fix, which is also
available in patch form for 3.4 and 3.5.
Credit goes to Deprotect Advisories
identification of the bug.
Patches:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch
[/quote]