=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata22.html,v retrieving revision 1.36 retrieving revision 1.37 diff -u -r1.36 -r1.37 --- www/errata22.html 2002/10/17 21:38:38 1.36 +++ www/errata22.html 2003/03/06 21:44:07 1.37 @@ -1,8 +1,8 @@ - + OpenBSD 2.2 errata - + @@ -13,7 +13,7 @@ [OpenBSD] -

+

This is the OpenBSD 2.2 release errata & patch list:

@@ -35,7 +35,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. @@ -47,18 +47,18 @@
-
  • All architectures

    +
  • All architectures

      -
    • SECURITY FIX
      +
    • SECURITY FIX
      If IPSEC communication is attempted by starting photurisd(8) (which is disabled by default), a system crash may be evoked from remote if an attacker uses some classes of invalid packets. - + A source code patch exists which remedies this problem.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      As stated in CERT advisory VB-98.04, there are buffer overrun problems in xterm related to the input-Method, preeditType, and *Keymap resources. Additional buffer overruns exist in @@ -69,43 +69,43 @@ a security vulnerability for any setuid-root program that uses the Xaw library (including xterm). Patch1 from XFree86 3.3.2 corrects these problems. - + We provide a version of this patch file specifically for the OpenBSD 2.2 tree.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      An exploitable buffer mismanagement exists in a subroutine used by lprm and lpd. The problem is exploitable by users on a particular machine if there is an entry in /etc/printcap which points at a remote printer. - + A patch is available which corrects this behaviour.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A DNS-based vulnerability exists when uucpd is used. By default uucpd is not enabled in the OpenBSD releases, but some sites may have enabled it. - + A patch is available which corrects this behaviour.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A vulnerability exists when (and only when) /etc/named.conf has the fake-iquery option enabled. - + A patch is available which corrects this behaviour.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A vulnerability exists in ping(8); if the -R option is used to record routes, an attacker can spoof a reply packet that will overflow inside ping. Preliminary investigation makes it look the worst attack possible is to make ping crash, but one never knows... - + A patch is available which corrects this behaviour.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      If the sysctl variable net.inet.ip.forwarding is enabled (value 1), but the variable net.inet.ip.sourceroute is disabled (value 0), the kernel will block source routed packets from @@ -113,11 +113,11 @@ itself. Our fix changes the net.inet.ip.sourceroute variable semantics to mean that all source routed packets should be blocked completely. - + A kernel patch is provided.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A combination localhost+remote host security problem exists if a local user running a setuid binary causes a non-existent root .rhosts file to be created via a symbolic link with a specific kind of corefile, @@ -129,11 +129,11 @@

      @@ -149,67 +149,67 @@ ssh 1.2.21 and previous (the ssh people have been alerted).

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A bug in the vm system permits a file descriptor opened read-only on a device, to later on be mmap(2)'d read-write, and then modified. This does not result in a security hole by itself, but it does violate the safety semantics which securelevels are supposed to provide. If a user manages to gain kmem group permissions, using this problem they can then gain root trivially and/or turn securelevels off. - + A kernel patch is available which corrects this behaviour (this is revision 3 of this patch).

      -

    • BUILD PROCESS FIX
      +
    • BUILD PROCESS FIX
      Building an object tree from a read-only source tree (such as off a CDROM) may fail under certain circumstances (e.g. when creating a symlink on sparc whose target name is exactly 33 characters). As a workaround you have to either provide the source tree read/write, or install a newer version of /usr/bin/readlink. - + A replacement source file exists.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      If a line in /etc/exports which contains hostnames results in an empty list because none of the supplied hostnames is known, mountd(8) will accidentally export the filesystem to the world. - + A patch is available which corrects this behaviour.

      -

    • RELIABILITY FIX
      +
    • RELIABILITY FIX
      Setting the MSG_EOR flag on a tcp packet in the send(2) family of system calls could cause a kernel panic. - + A patch to return EINVAL in this case is available.

    -
  • i386

    +
  • i386

      -
    • RELIABILITY FIX
      +
    • RELIABILITY FIX
      The Intel P5 F00F bug was discovered after the CDRs had already been sent to the manufacturer. This problem permits any user who has an account to lock your machine up using a 4-line program. The problem only affects Intel P5 processors (the i386, i486, P-Pro, and P-II are not vulnerable, nor are processors by other manufacturers). - + A kernel source-code patch is available.

      -

    • FUNCTIONALITY FIX
      +
    • FUNCTIONALITY FIX
      Some Linux binaries will execute in SVR4 emulation mode, which is definitely a problem for people who need Linux emulation to work correctly. To solve this mis-identification problem, - + a patch file is provided.

      -

    • RELIABILITY FIX
      +
    • RELIABILITY FIX
      APM can crash on machines without it. - + A kernel source-code patch is available.

      -

    • INSTALLATION PROCESS FLAW
      +
    • INSTALLATION PROCESS FLAW
      A few people are running into this problem, particularly if they had some other *BSD operating system on their machine before trying OpenBSD: if after installation onto an IDE-based machine, the kernel fails to mount the root @@ -221,9 +221,9 @@

    -
  • mac68k

    +
  • mac68k

      -
    • NEW SOFTWARE
      +
    • NEW SOFTWARE
      Unfortunately, X11 binaries for the mac68k did not manage to make it onto the CDROM. However, X11 for the mac68k is immediately available from @@ -231,7 +231,7 @@ be sure to read the README file also in that directory for instructions on installing and setting up X.

      -

    • INSTALLATION PROCESS FLAW
      +
    • INSTALLATION PROCESS FLAW
      As shipped on the CDROM, both the generic kernel @@ -255,97 +255,97 @@

    -
  • sparc

    +
  • sparc

      -
    • RELIABILITY FIX
      +
    • RELIABILITY FIX
      Older 4/xxx systems (particularly the 4/300's) cannot boot with the 2.2 kernel due to bugs in the scsi device driver. - + A kernel source patch is available. Replacement kernels are available for: -bsd, -bsd.scsi3, +bsd, +bsd.scsi3, and a replacement for bsd.rd is coming soon.

      -

    • RELIABILITY FIX
      +
    • RELIABILITY FIX
      SPARCstation 4 and 5 (Microsparc 2) users may see kernel panics when using a custom kernel configured for option sun4m only. - + A workaround (kernel source patch) is available. Apply the patch and then re-build your kernel.

    -
  • amiga

    +
  • amiga

      -
    • FUNCTIONALITY FIX
      +
    • FUNCTIONALITY FIX
      Missing Xamiga manual pages. Get - + this package and execute, as root:
      # pkg_add Xamiga-manual.tgz
      The MD5 checksum of this package is:
      MD5 (Xamiga-manual.tgz) = 2362a7857264b9d17f65cca258b42031

      -

    • FUNCTIONALITY FIX
      +
    • FUNCTIONALITY FIX
      The Ariadne ethernet support was broken, there will be both binary and source level fixes available shortly. If you are in a hurry mail -Niklas for a test kernel.

      +Niklas for a test kernel.

    -
  • pmax

    +
  • pmax

      -
    • FUNCTIONALITY FIX
      +
    • FUNCTIONALITY FIX
      There is a Year-1998 problem in the time-setting code (which causes the date and time to be set incorrectly after a reboot in 1998). - + A source code patch file is available plus replacement installation kernels for the 2.2 release at -bsd.NFS, -bsd, -bsd.rz0. +bsd.NFS, +bsd, +bsd.rz0.

      -

    • FUNCTIONALITY FIX
      +
    • FUNCTIONALITY FIX
      X11 support for the 3min and 3maxplus machines was broken due to a kernel bug. - + A source code patch is available.

      -

    • SECURITY FIX
      +
    • SECURITY FIX
      A security problem in the shared library linker ld.so requires that you replace it with a new binary. The following binary will work on both pmax and arc machines. - + The replacement binary is here.

    -
  • arc

    +
  • arc

      -
    • SECURITY FIX
      +
    • SECURITY FIX
      A security problem in the shared library linker ld.so requires that you replace it with a new binary. The following binary will work on both pmax and arc machines. - + The replacement binary is here.

    -
  • alpha

    +
  • alpha

      -
    • MISSING FUNCTIONALITY
      +
    • MISSING FUNCTIONALITY
      Network Address Translation and other parts of IP Filtering do not work on the alpha. This will be fixed in the 2.3 release, and perhaps earlier in a snapshot. There is no patch for 2.2.

    -
  • hp300

    +
  • hp300

    • No problems identified yet.

    -
  • mvme68k

    +
  • mvme68k

    • No problems identified yet.

      @@ -373,8 +373,8 @@


      OpenBSD -www@openbsd.org -
      $OpenBSD: errata22.html,v 1.36 2002/10/17 21:38:38 deraadt Exp $ +www@openbsd.org +
      $OpenBSD: errata22.html,v 1.37 2003/03/06 21:44:07 naddy Exp $