version 1.60, 2014/03/31 04:11:40 |
version 1.61, 2014/03/31 16:02:48 |
|
|
|
|
<ul> |
<ul> |
<li><a name="bmap"></a> |
<li><a name="bmap"></a> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A local user can crash the system by reading a file larger than 64meg |
A local user can crash the system by reading a file larger than 64meg |
from an ext2fs partition. |
from an ext2fs partition. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="lnpanic"></a> |
<li><a name="lnpanic"></a> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A local user can crash the system because of a bug in the vfs layer. |
A local user can crash the system because of a bug in the vfs layer. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="poll"></a> |
<li><a name="poll"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A machine crash is possible when playing with poll(2). |
A machine crash is possible when playing with poll(2). |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nlink"></a> |
<li><a name="nlink"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A machine crash is possible when playing with link(2) on FFS. |
A machine crash is possible when playing with link(2) on FFS. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
This is version four of the patch. |
This is version four of the patch. |
<p> |
<p> |
<li><a name="ping"></a> |
<li><a name="ping"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A buffer overflow existed in ping(8), which may have a security issue. |
A buffer overflow existed in ping(8), which may have a security issue. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ipqrace"></a> |
<li><a name="ipqrace"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A race condition in IP ipq handling could permit a remote crash. |
A race condition in IP ipq handling could permit a remote crash. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
|
and <a href="errata24.html#tcpfix">the tcp decoding patch</a>. |
and <a href="errata24.html#tcpfix">the tcp decoding patch</a>. |
<p> |
<p> |
<li><a name="accept"></a> |
<li><a name="accept"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A race condition existed between accept(2) and select(2) which could |
A race condition existed between accept(2) and select(2) which could |
permit an attacker to hang sockets from remote. |
permit an attacker to hang sockets from remote. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="maxqueue"></a> |
<li><a name="maxqueue"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
IP fragment assembly can bog the machine excessively and cause problems. |
IP fragment assembly can bog the machine excessively and cause problems. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="uio"></a> |
<li><a name="uio"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em> |
The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em> |
with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail. |
with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="rst"></a> |
<li><a name="rst"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
TCP/IP RST handling was too sloppy. |
TCP/IP RST handling was too sloppy. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="kvm_mkdb"></a> |
<li><a name="kvm_mkdb"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate |
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate |
memory". |
memory". |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nfs3_solaris7"></a> |
<li><a name="nfs3_solaris7"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A problem with writing to NFS version 3 mounted filesystems from Solaris 7 |
A problem with writing to NFS version 3 mounted filesystems from Solaris 7 |
hosts exists. Attempts to create files will result in an error such as |
hosts exists. Attempts to create files will result in an error such as |
"Inappropriate file type or format". |
"Inappropriate file type or format". |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nfs3"></a> |
<li><a name="nfs3"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A problem with NFS version 3 mounts on big endian machines (m68k, sparc |
A problem with NFS version 3 mounts on big endian machines (m68k, sparc |
and powerpc) exists when mounting filesystems larger than 2gig. You |
and powerpc) exists when mounting filesystems larger than 2gig. You |
can see evidence of the bug by running df(1) and checking for negative |
can see evidence of the bug by running df(1) and checking for negative |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="termcap"></a> |
<li><a name="termcap"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A security problem exists in the curses and ocurses libraries that affect |
A security problem exists in the curses and ocurses libraries that affect |
setuid programs linked with -lcurses or -locurses. |
setuid programs linked with -lcurses or -locurses. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch"> |
|
|
platform. Unpack it in /usr/lib. |
platform. Unpack it in /usr/lib. |
<p> |
<p> |
<li><a name="terminfo"></a> |
<li><a name="terminfo"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A workaround for an xterm problem that causes <strong>vi</strong> to not |
A workaround for an xterm problem that causes <strong>vi</strong> to not |
restore the correct cursor position on exit. |
restore the correct cursor position on exit. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch"> |
|
|
big endian</a> version. |
big endian</a> version. |
<p> |
<p> |
<li><a name="userdir"></a> |
<li><a name="userdir"></a> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
|
<i>All architectures</i><br> |
<strong>userdir</strong> support was accidentally left out of httpd(8). |
<strong>userdir</strong> support was accidentally left out of httpd(8). |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="bootpd"></a> |
<li><a name="bootpd"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A remotely exploitable problem exists in bootpd(8). bootpd is disabled |
A remotely exploitable problem exists in bootpd(8). bootpd is disabled |
by default, but some people may actually be using it. |
by default, but some people may actually be using it. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch"> |
|
|
This is the second version of the patch. |
This is the second version of the patch. |
<p> |
<p> |
<li><a name="tcpfix"></a> |
<li><a name="tcpfix"></a> |
<font color="#009000"><strong>SECURITY FIX</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
|
<i>All architectures</i><br> |
A remote machine lockup problem exists in the TCP decoding code. |
A remote machine lockup problem exists in the TCP decoding code. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |