===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata22.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -r1.95 -r1.96
--- www/errata22.html 2019/05/27 22:55:19 1.95
+++ www/errata22.html 2019/05/28 16:32:41 1.96
@@ -84,8 +84,9 @@
+
-
-SECURITY FIX
+001: SECURITY FIX
All architectures
If IPSEC communication is attempted by starting photurisd(8) (which is
disabled by default), a system crash may be evoked from remote if
@@ -93,8 +94,9 @@
A source code patch exists which remedies this problem.
+
-
-SECURITY FIX
+002: SECURITY FIX
All architectures
As stated in CERT advisory VB-98.04, there are buffer
overrun problems in xterm related to the input-Method,
@@ -109,8 +111,9 @@
We provide a version of this patch file specifically for the OpenBSD 2.2 tree.
+
-
-SECURITY FIX
+003: SECURITY FIX
All architectures
An exploitable buffer mismanagement exists in a subroutine used by
lprm and lpd. The problem is exploitable by users on a particular
@@ -119,24 +122,27 @@
A patch is available which corrects this behaviour.
+
-
-SECURITY FIX
+004: SECURITY FIX
All architectures
A DNS-based vulnerability exists when uucpd is used. By default uucpd
is not enabled in the OpenBSD releases, but some sites may have enabled it.
A patch is available which corrects this behaviour.
+
-
-SECURITY FIX
+005: SECURITY FIX
All architectures
A vulnerability exists when (and only when) /etc/named.conf has the
fake-iquery option enabled.
A patch is available which corrects this behaviour.
+
-
-SECURITY FIX
+006: SECURITY FIX
All architectures
A vulnerability exists in ping(8); if the -R option is used to record
routes, an attacker can spoof a reply packet that will overflow inside
@@ -145,8 +151,9 @@
A patch is available which corrects this behaviour.
+
-
-SECURITY FIX All architectures
+007: SECURITY FIX All architectures
If the sysctl variable net.inet.ip.forwarding is
enabled (value 1), but the variable net.inet.ip.sourceroute
is disabled (value 0), the kernel will block source routed packets from
@@ -157,8 +164,9 @@
A kernel patch is provided.
+
-
-SECURITY FIX
+008: SECURITY FIX
All architectures
A combination localhost+remote host security problem exists if a
local user running a setuid binary causes a non-existent root .rhosts
@@ -190,8 +198,9 @@
The problem with the ruserok() function appears to also exist in
ssh 1.2.21 and previous (the ssh people have been alerted).
+
-
-SECURITY FIX All architectures
+009: SECURITY FIX All architectures
A bug in the vm system permits a file descriptor opened read-only on a
device, to later on be mmap(2)'d read-write, and then modified. This
does not result in a security hole by itself, but it does violate the
@@ -202,7 +211,7 @@
A kernel patch is available which corrects this behaviour (this is
revision 3 of this patch).
-
- BUILD PROCESS FIX
+
- 010: BUILD PROCESS FIX
All architectures
Building an object tree from a read-only source tree (such as off a CDROM)
may fail under certain circumstances (e.g. when creating a symlink on sparc
@@ -212,8 +221,9 @@
A replacement source file exists.
+
-
-SECURITY FIX
+011: SECURITY FIX
All architectures
If a line in /etc/exports which contains hostnames results in an empty
list because none of the supplied hostnames is known, mountd(8) will
@@ -221,15 +231,16 @@
A patch is available which corrects this behaviour.
-
- RELIABILITY FIX
+
- 012: RELIABILITY FIX
All architectures
Setting the MSG_EOR flag on a tcp packet in the send(2) family of
system calls could cause a kernel panic.
A patch to return EINVAL in this case is available.
+
-
-RELIABILITY FIX
+013: RELIABILITY FIX
The Intel P5 F00F bug was discovered after the CDRs had already been
sent to the manufacturer. This problem permits any user who has an account
to lock your machine up using a 4-line program. The problem only affects
@@ -238,19 +249,19 @@
A kernel source-code patch is available.
-
- FUNCTIONALITY FIX
+ - 014: FUNCTIONALITY FIX
Some Linux binaries will execute in SVR4 emulation mode, which is
definitely a problem for people who need Linux emulation to work correctly.
To solve this mis-identification problem,
a patch file is provided.
-
- RELIABILITY FIX
+ - 015: RELIABILITY FIX
APM can crash on machines without it.
A kernel source-code patch is available.
-
- INSTALLATION PROCESS FLAW
+ - 016: INSTALLATION PROCESS FLAW
A few people are running into this problem, particularly if they had some
other *BSD operating system on their machine before trying OpenBSD: if after
installation onto an IDE-based machine, the kernel fails to mount the root
@@ -260,7 +271,7 @@
To repair this, use the floppy to run "disklabel -E wd0", then using the
"edit" command ensure the type field is set to "ST506".
-
- NEW SOFTWARE
+ - 017: NEW SOFTWARE
Unfortunately, X11 binaries for the mac68k did not manage to make it onto the
CDROM. However, X11 for the mac68k is immediately available from
@@ -268,7 +279,7 @@
be sure to read the README file also in that directory for instructions on installing
and setting up X.
-
- INSTALLATION PROCESS FLAW
+ - 018: INSTALLATION PROCESS FLAW
As shipped on the CDROM, both the
generic kernel
@@ -290,7 +301,7 @@
mini-shell to "cpin" the kernel. Alternately, you could install the kernel
with the Installer and use the mini-shell to move the binary from /usr/src/...
to /bsd
.
-
- RELIABILITY FIX
+ - 019: RELIABILITY FIX
Older 4/xxx systems (particularly the 4/300's) cannot boot
with the 2.2 kernel due to bugs in the scsi device driver.
@@ -300,27 +311,29 @@
bsd.scsi3,
and a replacement for bsd.rd is coming soon.
+
-
-RELIABILITY FIX
+020: RELIABILITY FIX
SPARCstation 4 and 5 (Microsparc 2) users may see kernel panics when
using a custom kernel configured for option sun4m only.
A workaround (kernel source patch) is available. Apply the patch and
then re-build your kernel.
-
- FUNCTIONALITY FIX
+ - 021: FUNCTIONALITY FIX
Missing Xamiga manual pages. Get
this package and execute, as root:
# pkg_add Xamiga-manual.tgz
The MD5 checksum of this package is:
-MD5 (Xamiga-manual.tgz) = 2362a7857264b9d17f65cca258b42031
-
- FUNCTIONALITY FIX
+MD5 (Xamiga-manual.tgz) = 2362a7857264b9d17f65cca258b42031
+
+
- 022: FUNCTIONALITY FIX
The Ariadne ethernet support was broken, there will be both binary and
source level fixes available shortly. If you are in a hurry mail
Niklas for a test kernel.
-
- FUNCTIONALITY FIX
+ - 023: FUNCTIONALITY FIX
There is a Year-1998 problem in the time-setting code (which causes the
date and time to be set incorrectly after a reboot in 1998).
@@ -330,28 +343,29 @@
bsd,
bsd.rz0.
-
- FUNCTIONALITY FIX
+ - 024: FUNCTIONALITY FIX
X11 support for the 3min and 3maxplus machines was broken
due to a kernel bug.
A source code patch is available.
+
-
-SECURITY FIX
+025: SECURITY FIX
A security problem in the shared library linker ld.so
requires that you replace it with a new binary. The following binary
will work on both pmax and arc machines.
The replacement binary is here.
-
- SECURITY FIX
+ - 026: SECURITY FIX
A security problem in the shared library linker ld.so requires
that you replace it with a new binary. The following binary
will work on both pmax and arc machines.
The replacement binary is here.
-
- MISSING FUNCTIONALITY
+ - 027: MISSING FUNCTIONALITY
Network Address Translation and other parts of IP Filtering do not work
on the alpha. This will be fixed in the 2.3 release, and perhaps earlier
in a snapshot. There is no patch for 2.2.