OpenBSD Journal

Security Fix for copy on amd64

Contributed by grey on from the similar arch, similar problem, different patch dept.

Similar to the i386 errata mentioned recently, there is a new patch for those running on amd64 architectures. Described as:

More stringent checking should be done in the copy(9) functions to prevent their misuse.
A source code patch exists which remedies this problem.

(Comments are closed)


Comments
  1. By Anonymous Coward (68.165.27.173) on

    OpenBSD
    Only one local hole in the default install, in more than 8 hours!

    Comments
    1. By tedu (68.120.199.134) on

      not if you were cool and ran a vax.

    2. By Anonymous Coward (204.209.209.129) on

      Well if noticed that the last one was for i386 and this one is for amd64... to different systems... oh wait and they are both in copy. Makes me think that this is even better security. You find one bug and find other occurences and fix them instead of discovering them later.

      Comments
      1. By unixfu pwn4d! (195.122.29.101) on

        oh, sure! waiting for alpha,sparc,ppc etc..

        Comments
        1. By Anonymous Coward (12.33.122.68) on

          yes. it's people like you who "wait" that is the problem

    3. By Anonymous Coward (193.62.198.2) on

      Hole?
      I think not.

    4. By pgilman (62.255.32.13) on


      give the guy a break; that was funny 8-)

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]