[BACK]Return to errata24.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata24.html between version 1.58 and 1.59

version 1.58, 2014/03/31 03:12:47 version 1.59, 2014/03/31 03:36:54
Line 75 
Line 75 
   
 <hr>  <hr>
   
 <a name="all"></a>  
 <h3><font color="#e00000">All architectures</font></h3>  
 <ul>  <ul>
 <li><a name="bmap"></a>  <li><a name="bmap"></a>
 <font color="#009000"><strong>RELIABILITY FIX</strong></font><br>  <font color="#009000"><strong>RELIABILITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A local user can crash the system by reading a file larger than 64meg  A local user can crash the system by reading a file larger than 64meg
 from an ext2fs partition.  from an ext2fs partition.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lnpanic"></a>  <li><a name="lnpanic"></a>
 <font color="#009000"><strong>RELIABILITY FIX</strong></font><br>  <font color="#009000"><strong>RELIABILITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A local user can crash the system because of a bug in the vfs layer.  A local user can crash the system because of a bug in the vfs layer.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="poll"></a>  <li><a name="poll"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A machine crash is possible when playing with poll(2).  A machine crash is possible when playing with poll(2).
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="nlink"></a>  <li><a name="nlink"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A machine crash is possible when playing with link(2) on FFS.  A machine crash is possible when playing with link(2) on FFS.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is version four of the patch.  This is version four of the patch.
 <p>  <p>
 <li><a name="ping"></a>  <li><a name="ping"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A buffer overflow existed in ping(8), which may have a security issue.  A buffer overflow existed in ping(8), which may have a security issue.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipqrace"></a>  <li><a name="ipqrace"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A race condition in IP ipq handling could permit a remote crash.  A race condition in IP ipq handling could permit a remote crash.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 119 
Line 117 
 and <a href="errata24.html#tcpfix">the tcp decoding patch</a>.  and <a href="errata24.html#tcpfix">the tcp decoding patch</a>.
 <p>  <p>
 <li><a name="accept"></a>  <li><a name="accept"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A race condition existed between accept(2) and select(2) which could  A race condition existed between accept(2) and select(2) which could
 permit an attacker to hang sockets from remote.  permit an attacker to hang sockets from remote.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="maxqueue"></a>  <li><a name="maxqueue"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 IP fragment assembly can bog the machine excessively and cause problems.  IP fragment assembly can bog the machine excessively and cause problems.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uio"></a>  <li><a name="uio"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em>  The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em>
 with an <strong>iov_len</strong> of 0.  This causes a db test in perl to fail.  with an <strong>iov_len</strong> of 0.  This causes a db test in perl to fail.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rst"></a>  <li><a name="rst"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 TCP/IP RST handling was too sloppy.  TCP/IP RST handling was too sloppy.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kvm_mkdb"></a>  <li><a name="kvm_mkdb"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate  During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
 memory".  memory".
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="nfs3_solaris7"></a>  <li><a name="nfs3_solaris7"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A problem with writing to NFS version 3 mounted filesystems from Solaris 7  A problem with writing to NFS version 3 mounted filesystems from Solaris 7
 hosts exists.  Attempts to create files will result in an error such as  hosts exists.  Attempts to create files will result in an error such as
 "Inappropriate file type or format".  "Inappropriate file type or format".
Line 160 
Line 158 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="nfs3"></a>  <li><a name="nfs3"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A problem with NFS version 3 mounts on big endian machines (m68k, sparc  A problem with NFS version 3 mounts on big endian machines (m68k, sparc
 and powerpc) exists when mounting filesystems larger than 2gig.  You  and powerpc) exists when mounting filesystems larger than 2gig.  You
 can see evidence of the bug by running df(1) and checking for negative  can see evidence of the bug by running df(1) and checking for negative
Line 169 
Line 167 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="termcap"></a>  <li><a name="termcap"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A security problem exists in the curses and ocurses libraries that affect  A security problem exists in the curses and ocurses libraries that affect
 setuid programs linked with -lcurses or -locurses.  setuid programs linked with -lcurses or -locurses.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch">
Line 180 
Line 178 
 platform.  Unpack it in /usr/lib.  platform.  Unpack it in /usr/lib.
 <p>  <p>
 <li><a name="terminfo"></a>  <li><a name="terminfo"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A workaround for an xterm problem that causes <strong>vi</strong> to not  A workaround for an xterm problem that causes <strong>vi</strong> to not
 restore the correct cursor position on exit.  restore the correct cursor position on exit.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch">
Line 195 
Line 193 
 big endian</a> version.  big endian</a> version.
 <p>  <p>
 <li><a name="userdir"></a>  <li><a name="userdir"></a>
 <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>  <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 <strong>userdir</strong> support was accidentally left out of httpd(8).  <strong>userdir</strong> support was accidentally left out of httpd(8).
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bootpd"></a>  <li><a name="bootpd"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A remotely exploitable problem exists in bootpd(8).  bootpd is disabled  A remotely exploitable problem exists in bootpd(8).  bootpd is disabled
 by default, but some people may actually be using it.  by default, but some people may actually be using it.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch">
Line 209 
Line 207 
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="tcpfix"></a>  <li><a name="tcpfix"></a>
 <font color="#009000"><strong>SECURITY FIX</strong></font><br>  <font color="#009000"><strong>SECURITY FIX</strong></font> &nbsp; <i>All architectures</i><br>
 A remote machine lockup problem exists in the TCP decoding code.  A remote machine lockup problem exists in the TCP decoding code.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>

Legend:
Removed from v.1.58  
changed lines
  Added in v.1.59