version 1.64, 2014/10/02 14:34:45 |
version 1.65, 2015/02/14 04:36:51 |
|
|
<hr> |
<hr> |
|
|
<ul> |
<ul> |
<li><a name="bmap"></a> |
<li id="bmap"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A local user can crash the system by reading a file larger than 64meg |
A local user can crash the system by reading a file larger than 64meg |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="lnpanic"></a> |
<li id="lnpanic"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A local user can crash the system because of a bug in the vfs layer. |
A local user can crash the system because of a bug in the vfs layer. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="poll"></a> |
<li id="poll"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A machine crash is possible when playing with poll(2). |
A machine crash is possible when playing with poll(2). |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nlink"></a> |
<li id="nlink"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A machine crash is possible when playing with link(2) on FFS. |
A machine crash is possible when playing with link(2) on FFS. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
This is version four of the patch. |
This is version four of the patch. |
<p> |
<p> |
<li><a name="ping"></a> |
<li id="ping"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A buffer overflow existed in ping(8), which may have a security issue. |
A buffer overflow existed in ping(8), which may have a security issue. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ipqrace"></a> |
<li id="ipqrace"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A race condition in IP ipq handling could permit a remote crash. |
A race condition in IP ipq handling could permit a remote crash. |
|
|
It must be installed after <a href="errata24.html#maxqueue">the maxqueue patch</a>. |
It must be installed after <a href="errata24.html#maxqueue">the maxqueue patch</a>. |
and <a href="errata24.html#tcpfix">the tcp decoding patch</a>. |
and <a href="errata24.html#tcpfix">the tcp decoding patch</a>. |
<p> |
<p> |
<li><a name="accept"></a> |
<li id="accept"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A race condition existed between accept(2) and select(2) which could |
A race condition existed between accept(2) and select(2) which could |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="maxqueue"></a> |
<li id="maxqueue"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
IP fragment assembly can bog the machine excessively and cause problems. |
IP fragment assembly can bog the machine excessively and cause problems. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="uio"></a> |
<li id="uio"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em> |
The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em> |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="rst"></a> |
<li id="rst"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
TCP/IP RST handling was too sloppy. |
TCP/IP RST handling was too sloppy. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="kvm_mkdb"></a> |
<li id="kvm_mkdb"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate |
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nfs3_solaris7"></a> |
<li id="nfs3_solaris7"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem with writing to NFS version 3 mounted filesystems from Solaris 7 |
A problem with writing to NFS version 3 mounted filesystems from Solaris 7 |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="nfs3"></a> |
<li id="nfs3"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem with NFS version 3 mounts on big endian machines (m68k, sparc |
A problem with NFS version 3 mounts on big endian machines (m68k, sparc |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="termcap"></a> |
<li id="termcap"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A security problem exists in the curses and ocurses libraries that affect |
A security problem exists in the curses and ocurses libraries that affect |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz">i386</a> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz">i386</a> |
platform. Unpack it in /usr/lib. |
platform. Unpack it in /usr/lib. |
<p> |
<p> |
<li><a name="terminfo"></a> |
<li id="terminfo"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A workaround for an xterm problem that causes <strong>vi</strong> to not |
A workaround for an xterm problem that causes <strong>vi</strong> to not |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz"> |
big endian</a> version. |
big endian</a> version. |
<p> |
<p> |
<li><a name="userdir"></a> |
<li id="userdir"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<strong>userdir</strong> support was accidentally left out of httpd(8). |
<strong>userdir</strong> support was accidentally left out of httpd(8). |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="bootpd"></a> |
<li id="bootpd"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A remotely exploitable problem exists in bootpd(8). bootpd is disabled |
A remotely exploitable problem exists in bootpd(8). bootpd is disabled |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
This is the second version of the patch. |
This is the second version of the patch. |
<p> |
<p> |
<li><a name="tcpfix"></a> |
<li id="tcpfix"> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<font color="#009000"><strong>SECURITY FIX</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A remote machine lockup problem exists in the TCP decoding code. |
A remote machine lockup problem exists in the TCP decoding code. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="tss"></a> |
<li id="tss"> |
<font color="#009000"><strong>SECURITY FIX</strong></font><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font><br> |
This is another fix for a kernel crash caused by the |
This is another fix for a kernel crash caused by the |
<strong>crashme</strong> program. |
<strong>crashme</strong> program. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="bootargv"></a> |
<li id="bootargv"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
The kernel was using a fixed and hard-coded location for the arguments |
The kernel was using a fixed and hard-coded location for the arguments |
vector passed from the <strong>/boot</strong> loader. This prevented |
vector passed from the <strong>/boot</strong> loader. This prevented |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="trctrap"></a> |
<li id="trctrap"> |
<font color="#009000"><strong>SECURITY FIX</strong></font><br> |
<font color="#009000"><strong>SECURITY FIX</strong></font><br> |
i386 trace-trap handling when DDB was configured could cause a system |
i386 trace-trap handling when DDB was configured could cause a system |
crash. |
crash. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="installboot"></a> |
<li id="installboot"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
i386 installboot had a sign extension bug which prevented proper bootblock |
i386 installboot had a sign extension bug which prevented proper bootblock |
initialization when the root filesystem was placed beyond 4GB. |
initialization when the root filesystem was placed beyond 4GB. |
|
|
Unfortunately, updated 2.4 install floppies are not available. Just ensure |
Unfortunately, updated 2.4 install floppies are not available. Just ensure |
that your root filesystem is below 4GB, for now. |
that your root filesystem is below 4GB, for now. |
<p> |
<p> |
<li><a name="hme"></a> |
<li id="hme"> |
<font color="#009000"><strong>DRIVER FIX</strong></font><br> |
<font color="#009000"><strong>DRIVER FIX</strong></font><br> |
The sparc hme(4) and be(4) drivers work poorly on some types of SS-20 |
The sparc hme(4) and be(4) drivers work poorly on some types of SS-20 |
machines. This is because those machines lie, saying they support 64-bit DMA |
machines. This is because those machines lie, saying they support 64-bit DMA |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="le"></a> |
<li id="le"> |
<font color="#009000"><strong>DRIVER FIX</strong></font><br> |
<font color="#009000"><strong>DRIVER FIX</strong></font><br> |
The sparc le(4) driver does media changes incorrectly on one type of |
The sparc le(4) driver does media changes incorrectly on one type of |
sbus le(4) card. |
sbus le(4) card. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="hp300X"></a> |
<li id="hp300X"> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
<font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br> |
The Xhp as shipped does not have the execute permissions set. The fix is |
The Xhp as shipped does not have the execute permissions set. The fix is |
'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X. |
'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X. |