version 1.194, 1999/08/31 11:43:40 |
version 1.195, 1999/09/14 02:53:10 |
|
|
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
In cron(8), make sure argv[] is NULL terminated in the fake popen() and |
In cron(8), make sure argv[] is NULL terminated in the fake popen() and |
run sendmail as the user, not as root. |
run sendmail as the user, not as root. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/cron.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/012_cron.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=miscfs></a> |
<a name=miscfs></a> |
|
|
The procfs and fdescfs filesystems had an overrun in their handling |
The procfs and fdescfs filesystems had an overrun in their handling |
of uio_offset in their readdir() routines. (These filesystems are not |
of uio_offset in their readdir() routines. (These filesystems are not |
enabled by default). |
enabled by default). |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/miscfs.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/011_miscfs.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=profil></a> |
<a name=profil></a> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
Stop profiling (see profil(2)) when we execve() a new process. |
Stop profiling (see profil(2)) when we execve() a new process. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/profil.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ipsec_in_use></a> |
<a name=ipsec_in_use></a> |
|
|
Packets that should have been handled by IPsec may be transmitted |
Packets that should have been handled by IPsec may be transmitted |
as cleartext. PF_KEY SA expirations may leak kernel resources. |
as cleartext. PF_KEY SA expirations may leak kernel resources. |
<a |
<a |
href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/ipsec_in_use.patch> |
href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/009_ipsec_in_use.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=rc></a> |
<a name=rc></a> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1) |
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1) |
to use -execdir. |
to use -execdir. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/rc.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/008_rc.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=chflags></a> |
<a name=chflags></a> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
<li><font color=#009000><strong>SECURITY FIX</strong></font><br> |
Do not permit regular users to chflags(2) or fchflags(2) on character or |
Do not permit regular users to chflags(2) or fchflags(2) on character or |
block devices which they may currently be the owner of. |
block devices which they may currently be the owner of. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/chflags.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/007_chflags.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=nroff></a> |
<a name=nroff></a> |
|
|
to avoid various groff features which may be security issues. On the |
to avoid various groff features which may be security issues. On the |
whole, this is not really a security issue, but it was discussed on |
whole, this is not really a security issue, but it was discussed on |
BUGTRAQ as if it is. |
BUGTRAQ as if it is. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/nroff.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/006_nroff.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=fts></a> |
<a name=fts></a> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
Programs using fts(3) could dump core when given a directory structure |
Programs using fts(3) could dump core when given a directory structure |
with a very large number of entries. |
with a very large number of entries. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/fts.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/005_fts.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=tcpsack></a> |
<a name=tcpsack></a> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in |
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in |
failure to retransmit correctly. |
failure to retransmit correctly. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/tcpsack.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/004_tcpsack.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ipsec1></a> |
<a name=ipsec1></a> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
Retransmitted TCP packets could get corrupted when flowing over an |
Retransmitted TCP packets could get corrupted when flowing over an |
IPSEC ESP tunnel. |
IPSEC ESP tunnel. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/espdata.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/003_espdata.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=bmap></a> |
<a name=bmap></a> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
A local user can crash the system by reading a file larger than 64meg |
A local user can crash the system by reading a file larger than 64meg |
from an ext2fs partition. |
from an ext2fs partition. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/bmap.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/002_bmap.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=pfkey></a> |
<a name=pfkey></a> |
|
|
system running an IPsec keymanagement daemon like photurisd or isakmpd |
system running an IPsec keymanagement daemon like photurisd or isakmpd |
will cause the networking subsystem to stop working after a finite amount |
will cause the networking subsystem to stop working after a finite amount |
of time. |
of time. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/pfkey.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/001_pfkey.patch> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
</ul> |
</ul> |
<p> |
<p> |
|
|
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br> |
Two problems in the powerpc kernel trap handling cause severe system |
Two problems in the powerpc kernel trap handling cause severe system |
unreliability. |
unreliability. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/trap.patch> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch> |
A source code patch exists which remedies these problems.</a> |
A source code patch exists which remedies these problems.</a> |
<p> |
<p> |
</ul> |
</ul> |