OpenBSD: procfs Incorrect bounds checking vulnerability
Posted by LinuxSecurity.com Team   
OpenBSD Incorrect bounds checking in several procfs functions could allow an unprivileged malicious user to read arbitrary kernel memory.

Incorrect bounds checking in several procfs functions could allow an 
unprivileged malicious user to read arbitrary kernel memory, with the 
potential to use this information to escalate privilege.  OpenBSD does not 
mount the proc filesystem by default, and we continue to recommend against 
its use.

The cvs -stable branches have been updated to contain a fix, which is also 
available in patch form for 3.4 and 3.5.

Credit goes to Deprotect Advisories <advisories@deprotect.com> for 
identification of the bug.

Patches: 
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch 
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch


-- desire is not an occupation