[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.197 and 1.198

version 1.197, 1999/09/26 13:00:42 version 1.198, 1999/11/09 09:00:34
Line 14 
Line 14 
   
 <img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif">  <img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif">
 <h2><font color=#0000e0>  <h2><font color=#0000e0>
 This is the OpenBSD 2.5 release errata &amp; patch list:  This is the OpenBSD 2.6 release errata &amp; patch list:
   
 </font></h2>  </font></h2>
   
Line 23 
Line 23 
 <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>  <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
 <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>  <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
 <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>  <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
   <a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
 <hr>  <hr>
   
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5.tar.gz>  <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6.tar.gz>
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 36 
Line 37 
 <li><h3><font color=#e00000>All architectures</font></h3>  <li><h3><font color=#e00000>All architectures</font></h3>
 <ul>  <ul>
 <a name=cron></a>  <a name=cron></a>
 <li><font color=#009000><strong>SECURITY FIX: Aug 30, 1999</strong></font><br>  <li><font color=#009000><strong>RELIABILITY FIX: Nov 8, 1999</strong></font><br>
 In cron(8), make sure argv[] is NULL terminated in the fake popen() and  A race condition in newsyslog(8) can cause errors in log file rotation.
 run sendmail as the user, not as root.  <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_newsyslog.patch>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/012_cron.patch>  
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=miscfs></a>  
 <li><font color=#009000><strong>SECURITY FIX: Aug 12, 1999</strong></font><br>  
 The procfs and fdescfs filesystems had an overrun in their handling  
 of uio_offset in their readdir() routines. (These filesystems are not  
 enabled by default).  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/011_miscfs.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=profil></a>  
 <li><font color=#009000><strong>SECURITY FIX: Aug 9, 1999</strong></font><br>  
 Stop profiling (see profil(2)) when we execve() a new process.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=ipsec_in_use></a>  
 <li><font color=#009000><strong>SECURITY FIX: Aug 6, 1999</strong></font><br>  
 Packets that should have been handled by IPsec may be transmitted  
 as cleartext. PF_KEY SA expirations may leak kernel resources.  
 <a  
 href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/009_ipsec_in_use.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=rc></a>  
 <li><font color=#009000><strong>SECURITY FIX: Aug 5, 1999</strong></font><br>  
 In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)  
 to use -execdir.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/008_rc.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=chflags></a>  
 <li><font color=#009000><strong>SECURITY FIX: Jul 30, 1999</strong></font><br>  
 Do not permit regular users to chflags(2) or fchflags(2) on character or  
 block devices which they may currently be the owner of.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/007_chflags.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=nroff></a>  
 <li><font color=#009000><strong>SECURITY FIX: Jul 27, 1999</strong></font><br>  
 Cause groff(1) to be invoked with the -S flag, when called by nroff(1),  
 to avoid various groff features which may be security issues.  On the  
 whole, this is not really a security issue, but it was discussed on  
 BUGTRAQ as if it is.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/006_nroff.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=fts></a>  
 <li><font color=#009000><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>  
 Programs using fts(3) could dump core when given a directory structure  
 with a very large number of entries.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/005_fts.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=tcpsack></a>  
 <li><font color=#009000><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>  
 Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in  
 failure to retransmit correctly.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/004_tcpsack.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=ipsec1></a>  
 <li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>  
 Retransmitted TCP packets could get corrupted when flowing over an  
 IPSEC ESP tunnel.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/003_espdata.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=bmap></a>  
 <li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>  
 A local user can crash the system by reading a file larger than 64meg  
 from an ext2fs partition.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/002_bmap.patch>  
 A source code patch exists which remedies this problem.</a>  
 <p>  
 <a name=pfkey></a>  
 <li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>  
 PF_KEY socket operations leak internal kernel resources, so that a  
 system running an IPsec keymanagement daemon like photurisd or isakmpd  
 will cause the networking subsystem to stop working after a finite amount  
 of time.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/001_pfkey.patch>  
 A source code patch exists which remedies this problem.</a>  
 </ul>  </ul>
 <p>  <p>
 <a name=i386></a>  <a name=i386></a>
Line 134 
Line 53 
 <a name=mac68k></a>  <a name=mac68k></a>
 <li><h3><font color=#e00000>mac68k</font></h3>  <li><h3><font color=#e00000>mac68k</font></h3>
 <ul>  <ul>
 <a name=macutils></a>  <li>No problems identified yet.
 <li><font color=#009000><strong>INSTALL PROBLEM</strong></font><br>  
 The mac68k install utils were mistakenly left off the CD and out of  
 the FTP install directories.  These tools have now been added to the  
 FTP install directories.  See  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils>  
 ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils</a>  
 <p>  
 </ul>  </ul>
 <p>  <p>
 <a name=sparc></a>  <a name=sparc></a>
Line 189 
Line 101 
 <a name=powerpc></a>  <a name=powerpc></a>
 <li><h3><font color=#e00000>powerpc</font></h3>  <li><h3><font color=#e00000>powerpc</font></h3>
 <ul>  <ul>
 <a name=powerpc_trap></a>  <li>No problems identified yet.
 <li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>  
 Two problems in the powerpc kernel trap handling cause severe system  
 unreliability.  
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch>  
 A source code patch exists which remedies these problems.</a>  
 <p>  
 </ul>  </ul>
   
 </dl>  </dl>
Line 206 
Line 112 
 <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>  <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
 <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>  <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
 <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>  <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
   <a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
 <hr>  <hr>
   
 <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>  <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>

Legend:
Removed from v.1.197  
changed lines
  Added in v.1.198