version 1.175, 1999/03/22 07:37:57 |
version 1.176, 1999/04/12 08:41:51 |
|
|
|
|
<img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif"> |
<img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif"> |
<h2><font color=#0000e0> |
<h2><font color=#0000e0> |
This is the OpenBSD 2.4 release errata & patch list: |
This is the OpenBSD 2.5 release errata & patch list: |
|
|
</font></h2> |
</font></h2> |
|
|
|
|
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br> |
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br> |
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br> |
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br> |
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br> |
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br> |
|
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<hr> |
<hr> |
|
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4.tar.gz> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5.tar.gz> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
|
|
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
<a name=poll></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A machine crash is possible when playing with poll(2). |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=nlink></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A machine crash is possible when playing with link(2) on FFS. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch> |
|
A source code patch exists which remedies this problem. This |
|
is version four of the patch.</a> |
|
<p> |
|
<a name=ping></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A buffer overflow existed in ping(8), which may have a security issue. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=ipqrace></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A race condition in IP ipq handling could permit a remote crash. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
It must be installed after <a href=errata.html#maxqueue>the maxqueue patch</a>. |
|
and <a href=errata.html#tcpfix>the tcp decoding patch</a>. |
|
<p> |
|
<a name=accept></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A race condition existed between accept(2) and select(2) which could |
|
permit an attacker to hang sockets from remote. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=maxqueue></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
IP fragment assembly can bog the machine excessively and cause problems. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=uio></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em> |
|
with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=rst></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
TCP/IP RST handling was too sloppy. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=kvm_mkdb></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate |
|
memory". |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=nfs3_solaris7></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
A problem with writing to NFS version 3 mounted filesystems from Solaris 7 |
|
hosts exists. Attempts to create files will result in a error such as |
|
"Inappropriate file type or format". |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=nfs3></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
A problem with NFS version 3 mounts on big endian machines (m68k, sparc |
|
and powerpc) exists when mounting filesystems larger than 2gig. You |
|
can see evidence of the bug by running df(1) and checking for negative |
|
partition sizes. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=termcap></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A security problem exists in the curses and ocurses libraries that affect |
|
setuid programs linked with -lcurses or -locurses. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<br> |
|
Precompiled versions of libcurses and libocurses exist for the |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz>i386</a> |
|
platform. Unpack it in /usr/lib. |
|
<p> |
|
<a name=terminfo></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
A workaround for an xterm problem that causes <strong>vi</strong> to not |
|
restore the correct cursor position on exit. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<br> |
|
Alternately, you can also download a pre-compiled terminfo file to be |
|
installed as <strong>/usr/share/misc/terminfo.db</strong>. For i386, |
|
alpha and mips, use the |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-LE.tar.gz> |
|
little endian</a> version. For sparc, m68k and powerpc, use the |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz> |
|
big endian</a> version. |
|
<p> |
|
<a name=userdir></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
<strong>userdir</strong> support was accidentally left out of httpd(8). |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=bootpd></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A remotely exploitable problem exists in bootpd(8). bootpd is disabled |
|
by default, but some people may actually be using it. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch> |
|
A source code patch exists which remedies this problem</a>, this is the |
|
second version of the patch. |
|
<p> |
|
<a name=tcpfix></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
A remote machine lockup problem exists in the TCP decoding code. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
</ul> |
</ul> |
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color=#e00000>i386</font></h3> |
<ul> |
<ul> |
<a name=tss></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
This is another fix for a kernel crash caused by the |
|
<strong>crashme</strong> program. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch> |
|
A source code patch exists which remedies this problem.</a><br> |
|
<p> |
|
<a name=bootargv></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
The kernel was using a fixed and hard-coded location for the arguments |
|
vector passed from the <strong>/boot</strong> loader. This prevented |
|
</strong>/boot</strong> from placing the boot arguments vector at any |
|
other location, causing a kernel crash early in the autoconfiguration |
|
stage. In 2.5, the bootblocks will be modified to use a new location. |
|
Hence, if you wish old kernels to boot on a new bootblock, those |
|
kernels will only work if they were linked with this patch. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch> |
|
A source code patch exists which remedies this problem.</a><br> |
|
<p> |
|
<a name=trctrap></a> |
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
|
i386 trace-trap handling when DDB was configured could cause a system |
|
crash. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch> |
|
A source code patch exists which remedies this problem.</a><br> |
|
<p> |
|
<a name=installboot></a> |
|
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
i386 installboot had a sign extention bug which prevented proper bootblock |
|
initialization when the root filesystem was placed beyond 4GB. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/installboot.patch> |
|
A source code patch exists which remedies this problem.</a><br> |
|
Unfortunately, updated 2.4 install floppies are not available. Just ensure |
|
that your root filesystem is below 4GB, for now. |
|
<p> |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=mac68k></a> |
<a name=mac68k></a> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<ul> |
<ul> |
<p> |
|
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=sparc></a> |
<a name=sparc></a> |
<li><h3><font color=#e00000>sparc</font></h3> |
<li><h3><font color=#e00000>sparc</font></h3> |
<ul> |
<ul> |
<a name=hme></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>DRIVER FIX</strong></font><br> |
|
The sparc hme(4) and be(4) drivers work poorly on some types of of SS-20 |
|
machines. This is because those machines lie, saying they support 64-bit DMA |
|
bursting. No sun4m machines support that. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=le></a> |
|
<li><font color=#009000><strong>DRIVER FIX</strong></font><br> |
|
The sparc le(4) driver does media changes incorrectly on one type of |
|
sbus le(4) card. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
</ul> |
</ul> |
<a name=amiga></a> |
<a name=amiga></a> |
<li><h3><font color=#e00000>amiga</font></h3> |
<li><h3><font color=#e00000>amiga</font></h3> |
|
|
<a name=hp300></a> |
<a name=hp300></a> |
<li><h3><font color=#e00000>hp300</font></h3> |
<li><h3><font color=#e00000>hp300</font></h3> |
<ul> |
<ul> |
<a name=hp300X></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>FUNCTIONALITY FIX</strong></font><br> |
|
The Xhp as shipped does not have the execute permissions set. The fix is |
|
'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X. |
|
<p> |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=mvme68k></a> |
<a name=mvme68k></a> |
|
|
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br> |
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br> |
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br> |
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br> |
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br> |
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br> |
|
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<hr> |
<hr> |
|
|
<a href=orders.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=orders.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=mailto:www@openbsd.org>www@openbsd.org</a> |
<a href=mailto:www@openbsd.org>www@openbsd.org</a> |
<br><small>$OpenBSD$</small> |
<br><small>$OpenBSD$</small> |