openbsd OpenBSD now enforcing no invalid NUL characters in shell scripts By undeadly.org Published On :: Tue, 24 Sep 2024 10:57:32 GMT Our favorite operating system is now changing the default shell (ksh) to enforce not allowing invalid NUL characters in input that will be parsed as parts of the script. The commit message reads, List: openbsd-cvs Subject: CVS: cvs.openbsd.org: src From: Theo de Raadt <deraadt () cvs ! openbsd ! org> Date: 2024-09-23 21:18:33 CVSROOT: /cvs Module name: src Changes by: deraadt@cvs.openbsd.org 2024/09/23 15:18:33 Modified files: bin/ksh : shf.c Log message: If during parsing lines in the script, ksh finds a NUL byte on the line, it should abort ("syntax error: NUL byte unexpected"). There appears to be one piece of software which is misinterpreting guidance of this, and trying to depend upon embedded NUL. During research, every shell we tested has one or more cases where a NUL byte in the input or inside variable contents will create divergent behaviour from other shells. (ie. gets converted to a space, is silently skipped, or aborts script parsing or later execution). All the shells are written in C, and majority of them use C strings for everything, which means they cannot embed a NUL, so this is not surprising. It is quite unbelievable there are people trying to rewrite history on a lark, and expecting the world to follow alone. Read more… Full Article
openbsd OpenBSD -current is now "7.6-current" By undeadly.org Published On :: Tue, 24 Sep 2024 16:38:45 GMT Theo de Raadt (deraadt@) updated the version of OpenBSD -current to "7.6-current". Those running the latest-and-greatest [via a sufficiently new snapshot or built from source] no longer need to use "-D snap" with pkg_add(1) (and pkg_info(1)). Full Article
openbsd OpenBSD 7.6 Released By undeadly.org Published On :: Mon, 07 Oct 2024 20:42:13 GMT The OpenBSD project has announced OpenBSD 7.6, its 57th release. The new release contains a number of significant improvements, including but not limited to: There is initial support for Qualcomm Snapdragon X Elite [arm64] laptops. Initial support for Suspend-to-Idle has been added on amd64 and i386, enabling suspend on machines which do not support S3. UDP parallel input has been enabled. [See earlier report] Libva's VA-API (Video Acceleration API) was imported into xenocara. [See earlier report] The default write format for tar(1) has changed to "pax". [See earlier report] pfctl(8) and systat(1) now display fragment reassembly statistics. [See earlier report] A configurable passphrase timeout for disk decryption at boot (a potential battery lifesaver) has been added. [See earlier report] Local-to-anchor tables are now available in pf(4) rules. [See earlier report] rport(4), a driver providing point-to-point interfaces for layer 3 connectivity between rdomain(4) instances, has been added. dhcp6leased(8), a DHCPv6 client daemon for IPv6 PD has been added. [See earlier report] dhclient(8) has been removed (now that dhcpleased(8) is well established). [See earlier report] OpenSSH 9.9, featuring: sshd(8) has been split into multiple binaries. [See earlier report] Options to penalize undesirable behavior [See earlier report] support for a new hybrid post-quantum key exchange [See earlier report] and of course there is the full changelog which details the changes made over this latest six month development cycle. Installation Guide details how to get the system up and running with a fresh install, while those who already run earlier releases should follow the Upgrade Guide, in most cases using sysupgrade(8) to upgrade their systems. Now please dive in and enjoy the new release, and while the installer runs, please do donate to the project to support further development and more future goodies for us all! Full Article
openbsd Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
openbsd Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
openbsd OpenBSD Dynamic Loader chpass Privilege Escalation By packetstormsecurity.com Published On :: Fri, 27 Dec 2019 21:27:23 GMT This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64). Full Article
openbsd OpenBSD OpenSMTPD Privilege Escalation / Code Execution By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 17:22:34 GMT Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root. Full Article
openbsd FBI Possibly Backdoored OpenBSD IPSEC Stack By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 16:36:40 GMT Full Article headline fbi backdoor openbsd
openbsd OpenBSD 2.8 Announced By packetstormsecurity.com Published On :: Fri, 01 Dec 2000 12:57:57 GMT Full Article bsd
openbsd OpenBSD 2.9 Released By packetstormsecurity.com Published On :: Fri, 01 Jun 2001 09:38:04 GMT Full Article bsd
openbsd OpenBSD 3.0 Released By packetstormsecurity.com Published On :: Sat, 01 Dec 2001 05:43:17 GMT Full Article bsd
openbsd OpenBSD 3.1 Released By packetstormsecurity.com Published On :: Sat, 01 Jun 2002 13:03:14 GMT Full Article bsd
openbsd OpenBSD - Call For Donations By packetstormsecurity.com Published On :: Sat, 28 Feb 2009 22:16:54 GMT Full Article bsd
openbsd OpenBSD Forks, Prunes, Fixes OpenSSL By packetstormsecurity.com Published On :: Tue, 22 Apr 2014 15:09:34 GMT Full Article headline flaw bsd ssl cryptography
openbsd NetBSD, OpenBSD Improve Kernel Security, Randomly By packetstormsecurity.com Published On :: Mon, 23 Oct 2017 13:48:18 GMT Full Article headline bsd
openbsd OpenBSD Releases Meltdown Patch By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 15:16:15 GMT Full Article headline linux bsd kernel patch
openbsd X.org Bug Bites OpenBSD And Other Big Operating Systems By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 14:37:28 GMT Full Article headline linux flaw bsd
openbsd OpenBSD Patches Auth Bypass, Privilege Escalation Vulns By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:00 GMT Full Article headline flaw bsd patch