===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata23.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -c -r1.49 -r1.50
*** www/errata23.html 2010/03/08 21:53:37 1.49
--- www/errata23.html 2010/07/08 19:00:07 1.50
***************
*** 53,59 ****
!
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
--- 53,59 ----
!
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
***************
*** 70,83 ****
SECURITY FIX
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
!
A source code patch exists which remedies this problem, this is the
second version of the patch.
SECURITY FIX
A remote machine lockup problem exists in the TCP decoding code.
!
A source code patch exists which remedies this problem.
--- 70,83 ----
SECURITY FIX
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
!
A source code patch exists which remedies this problem, this is the
second version of the patch.
SECURITY FIX
A remote machine lockup problem exists in the TCP decoding code.
!
A source code patch exists which remedies this problem.
***************
*** 85,117 ****
Some ATAPI cdroms which do not support the full mandatory command set,
(e.g. ATAPI_READ_CD_CAPACITY) do not work with the acd(4) driver.
A patch is
!
available here.
SECURITY FIX
Chpass(1) has a file descriptor leak which allows an
attacker to modify /etc/master.passwd.
!
A source code patch exists which remedies this problem.
RELIABILITY FIX
Calling readv(2) with iov_len < 0 or > INT_MAX would result in a
kernel panic. This is the third revision of this patch.
!
A source code patch exists which remedies this problem.
SECURITY FIX
Inetd had a file descriptor leak. A patch is
!
available here.
BUG FIX
As shipped, unionfs had some serious problems.
!
A patch is available to solve this.
--- 85,117 ----
Some ATAPI cdroms which do not support the full mandatory command set,
(e.g. ATAPI_READ_CD_CAPACITY) do not work with the acd(4) driver.
A patch is
!
available here.
SECURITY FIX
Chpass(1) has a file descriptor leak which allows an
attacker to modify /etc/master.passwd.
!
A source code patch exists which remedies this problem.
RELIABILITY FIX
Calling readv(2) with iov_len < 0 or > INT_MAX would result in a
kernel panic. This is the third revision of this patch.
!
A source code patch exists which remedies this problem.
SECURITY FIX
Inetd had a file descriptor leak. A patch is
!
available here.
BUG FIX
As shipped, unionfs had some serious problems.
!
A patch is available to solve this.
***************
*** 121,127 ****
be executed with these descriptors unallocated. A patch which forces
setuid and setgid processes to have some descriptors in fd slots
0, 1, and 2 is
!
available here.
--- 121,127 ----
be executed with these descriptors unallocated. A patch which forces
setuid and setgid processes to have some descriptors in fd slots
0, 1, and 2 is
!
available here.
***************
*** 129,135 ****
A benign looking buffer overflow in the resolver routines was re-introduced
accidentally. The previously fixed behaviour is more correct. A patch
to fix this is
!
available here.
--- 129,135 ----
A benign looking buffer overflow in the resolver routines was re-introduced
accidentally. The previously fixed behaviour is more correct. A patch
to fix this is
!
available here.
***************
*** 143,149 ****
distributed with OpenBSD are vulnerable to some or all of these
problems.
These problems are fixed in XFree86 patch 2.
!
The 2nd source patch for these problems, specifically adapted to the
OpenBSD 2.3 X11 tree, is available now.
--- 143,149 ----
distributed with OpenBSD are vulnerable to some or all of these
problems.
These problems are fixed in XFree86 patch 2.
!
The 2nd source patch for these problems, specifically adapted to the
OpenBSD 2.3 X11 tree, is available now.
***************
*** 153,159 ****
be delivered to setuid or setgid processes. If such processes were using
those signals in dubious ways, this could have resulted in security
problems of various kinds.
!
The fourth revision of a source code patch which solves the problem is
available.
--- 153,159 ----
be delivered to setuid or setgid processes. If such processes were using
those signals in dubious ways, this could have resulted in security
problems of various kinds.
!
The fourth revision of a source code patch which solves the problem is
available.
***************
*** 164,170 ****
permit mmap'ing of immutable or append-only files which are otherwise
writable, as the VM system will bypass the meaning of the file flags
when writes happen to the file.
!
A source code patch exists which remedies this problem.
--- 164,170 ----
permit mmap'ing of immutable or append-only files which are otherwise
writable, as the VM system will bypass the meaning of the file flags
when writes happen to the file.
!
A source code patch exists which remedies this problem.
***************
*** 172,178 ****
If IPSEC communication is attempted by starting photurisd(8) (which is
disabled by default), a system crash may be evoked from remote if
an attacker uses some classes of invalid packets.
!
A source code patch exists which remedies this problem.
--- 172,178 ----
If IPSEC communication is attempted by starting photurisd(8) (which is
disabled by default), a system crash may be evoked from remote if
an attacker uses some classes of invalid packets.
!
A source code patch exists which remedies this problem.
***************
*** 187,209 ****
a security vulnerability for any setuid-root program that uses the Xaw
library (including xterm). Patch1 from XFree86 3.3.2 corrects
these problems.
!
We provide a version of this patch file specifically for the OpenBSD 2.3 tree.
We also provide tar files which replace the xterm(1) binary and the libXaw
libraries on your system. These are expected to be extracted in
/usr/X11R6 using the command
"tar xvfpz Xawfix.tgz".
The files are...
! i386,
! alpha,
! mac68k,
!
mvme68k,
! hp300,
! sparc,
! pmax,
and
! arc.
--- 187,209 ----
a security vulnerability for any setuid-root program that uses the Xaw
library (including xterm). Patch1 from XFree86 3.3.2 corrects
these problems.
!
We provide a version of this patch file specifically for the OpenBSD 2.3 tree.
We also provide tar files which replace the xterm(1) binary and the libXaw
libraries on your system. These are expected to be extracted in
/usr/X11R6 using the command
"tar xvfpz Xawfix.tgz".
The files are...
! i386,
! alpha,
! mac68k,
!
mvme68k,
! hp300,
! sparc,
! pmax,
and
! arc.
***************
*** 219,226 ****
CORRUPTED FILE
The CD version of the precompiled ghostscript package is corrupted and
not installable. The correct file can be retrieved by FTP from:
!
! ftp://ftp.openbsd.org/pub/OpenBSD/2.3/packages/i386/ghostscript-5.10.tgz.
Its checksums (obtained with cksum(1), md5(1) and
sha1(1) respectively) are:
***************
*** 252,264 ****
RELIABILITY FIX
The 2.3 release does not run reliably on the sun4m LX/LC machines
(ie. Sparc Classic).
!
A source code patch exists which remedies this problem.
Two kernels which replace the ones in the release are also provided:
! bsd and
! bsd.scsi3.
Other replacements for the 2.3 install tools are
! also available.
--- 252,264 ----
RELIABILITY FIX
The 2.3 release does not run reliably on the sun4m LX/LC machines
(ie. Sparc Classic).
!
A source code patch exists which remedies this problem.
Two kernels which replace the ones in the release are also provided:
! bsd and
! bsd.scsi3.
Other replacements for the 2.3 install tools are
! also available.
***************
*** 411,417 ****
www@openbsd.org
!
$OpenBSD: errata23.html,v 1.49 2010/03/08 21:53:37 deraadt Exp $