Annotation of www/errata24.html, Revision 1.66
1.24 naddy 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
1.1 deraadt 2: <html>
3: <head>
1.7 deraadt 4: <title>OpenBSD 2.4 errata</title>
1.1 deraadt 5: <meta name="resource-type" content="document">
6: <meta name="description" content="the OpenBSD CD errata page">
7: <meta name="keywords" content="openbsd,cd,errata">
8: <meta name="distribution" content="global">
1.27 henning 9: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.1 deraadt 10: </head>
11:
1.64 deraadt 12: <!--
13: IMPORTANT REMINDER
14: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
15: -->
16:
1.28 david 17: <body bgcolor="#ffffff" text="#000000" link="#23238E">
1.1 deraadt 18:
1.18 jsyn 19: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
1.64 deraadt 20: <h2><font color="#e00000">
21: OpenBSD 2.4 errata
1.1 deraadt 22: </font></h2>
23:
24: <hr>
1.8 jason 25: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
1.20 deraadt 26: <br>
1.21 deraadt 27: For errata on a certain release, click below:<br>
1.20 deraadt 28: <a href="errata21.html">2.1</a>,
29: <a href="errata22.html">2.2</a>,
30: <a href="errata23.html">2.3</a>,
31: <a href="errata25.html">2.5</a>,
32: <a href="errata26.html">2.6</a>,
33: <a href="errata27.html">2.7</a>,
34: <a href="errata28.html">2.8</a>,
35: <a href="errata29.html">2.9</a>,
36: <a href="errata30.html">3.0</a>,
37: <a href="errata31.html">3.1</a>,
1.25 deraadt 38: <a href="errata32.html">3.2</a>,
1.39 david 39: <a href="errata33.html">3.3</a>,
1.30 david 40: <a href="errata34.html">3.4</a>,
1.32 miod 41: <a href="errata35.html">3.5</a>,
1.33 deraadt 42: <a href="errata36.html">3.6</a>,
1.57 deraadt 43: <a href="errata37.html">3.7</a>,
1.42 deraadt 44: <br>
1.35 deraadt 45: <a href="errata38.html">3.8</a>,
1.36 deraadt 46: <a href="errata39.html">3.9</a>,
1.37 deraadt 47: <a href="errata40.html">4.0</a>,
1.40 merdely 48: <a href="errata41.html">4.1</a>,
1.41 deraadt 49: <a href="errata42.html">4.2</a>,
1.42 deraadt 50: <a href="errata43.html">4.3</a>,
1.44 deraadt 51: <a href="errata44.html">4.4</a>,
1.45 deraadt 52: <a href="errata45.html">4.5</a>,
1.46 deraadt 53: <a href="errata46.html">4.6</a>,
1.48 deraadt 54: <a href="errata47.html">4.7</a>,
1.49 miod 55: <a href="errata48.html">4.8</a>,
1.50 nick 56: <a href="errata49.html">4.9</a>,
1.51 sthen 57: <a href="errata50.html">5.0</a>,
1.52 deraadt 58: <a href="errata51.html">5.1</a>,
1.53 deraadt 59: <a href="errata52.html">5.2</a>,
1.54 deraadt 60: <a href="errata53.html">5.3</a>,
1.57 deraadt 61: <br>
1.55 deraadt 62: <a href="errata54.html">5.4</a>,
1.63 jsg 63: <a href="errata55.html">5.5</a>,
64: <a href="errata56.html">5.6</a>.
1.20 deraadt 65: <br>
1.1 deraadt 66: <hr>
67:
1.47 sthen 68: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4.tar.gz">
1.1 deraadt 69: You can also fetch a tar.gz file containing all the following patches</a>.
70: This file is updated once a day.
1.58 deraadt 71: <p>
1.1 deraadt 72:
1.58 deraadt 73: The patches below are available in CVS via the
74: <code>OPENBSD_2_4</code> <a href="stable.html">patch branch</a>.
1.9 ericj 75: <p>
1.58 deraadt 76:
1.22 deraadt 77: For more detailed information on how to install patches to OpenBSD, please
1.58 deraadt 78: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
79: <p>
1.9 ericj 80:
1.1 deraadt 81: <hr>
1.58 deraadt 82:
1.11 jufi 83: <ul>
1.65 bentley 84: <li id="bmap">
1.61 deraadt 85: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
86: <i>All architectures</i><br>
1.3 millert 87: A local user can crash the system by reading a file larger than 64meg
88: from an ext2fs partition.
1.47 sthen 89: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch">
1.3 millert 90: A source code patch exists which remedies this problem.</a>
91: <p>
1.65 bentley 92: <li id="lnpanic">
1.61 deraadt 93: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
94: <i>All architectures</i><br>
1.2 deraadt 95: A local user can crash the system because of a bug in the vfs layer.
1.47 sthen 96: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch">
1.2 deraadt 97: A source code patch exists which remedies this problem.</a>
98: <p>
1.65 bentley 99: <li id="poll">
1.61 deraadt 100: <font color="#009000"><strong>SECURITY FIX</strong></font>
101: <i>All architectures</i><br>
1.1 deraadt 102: A machine crash is possible when playing with poll(2).
1.47 sthen 103: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch">
1.1 deraadt 104: A source code patch exists which remedies this problem.</a>
105: <p>
1.65 bentley 106: <li id="nlink">
1.61 deraadt 107: <font color="#009000"><strong>SECURITY FIX</strong></font>
108: <i>All architectures</i><br>
1.1 deraadt 109: A machine crash is possible when playing with link(2) on FFS.
1.47 sthen 110: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch">
1.58 deraadt 111: A source code patch exists which remedies this problem.</a>
112: This is version four of the patch.
1.1 deraadt 113: <p>
1.65 bentley 114: <li id="ping">
1.61 deraadt 115: <font color="#009000"><strong>SECURITY FIX</strong></font>
116: <i>All architectures</i><br>
1.1 deraadt 117: A buffer overflow existed in ping(8), which may have a security issue.
1.47 sthen 118: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch">
1.1 deraadt 119: A source code patch exists which remedies this problem.</a>
120: <p>
1.65 bentley 121: <li id="ipqrace">
1.61 deraadt 122: <font color="#009000"><strong>SECURITY FIX</strong></font>
123: <i>All architectures</i><br>
1.1 deraadt 124: A race condition in IP ipq handling could permit a remote crash.
1.47 sthen 125: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch">
1.1 deraadt 126: A source code patch exists which remedies this problem.</a>
1.24 naddy 127: It must be installed after <a href="errata24.html#maxqueue">the maxqueue patch</a>.
128: and <a href="errata24.html#tcpfix">the tcp decoding patch</a>.
1.1 deraadt 129: <p>
1.65 bentley 130: <li id="accept">
1.61 deraadt 131: <font color="#009000"><strong>SECURITY FIX</strong></font>
132: <i>All architectures</i><br>
1.1 deraadt 133: A race condition existed between accept(2) and select(2) which could
134: permit an attacker to hang sockets from remote.
1.47 sthen 135: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch">
1.1 deraadt 136: A source code patch exists which remedies this problem.</a>
137: <p>
1.65 bentley 138: <li id="maxqueue">
1.61 deraadt 139: <font color="#009000"><strong>SECURITY FIX</strong></font>
140: <i>All architectures</i><br>
1.1 deraadt 141: IP fragment assembly can bog the machine excessively and cause problems.
1.47 sthen 142: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch">
1.1 deraadt 143: A source code patch exists which remedies this problem.</a>
144: <p>
1.65 bentley 145: <li id="uio">
1.61 deraadt 146: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
147: <i>All architectures</i><br>
1.1 deraadt 148: The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em>
149: with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail.
1.55 deraadt 150: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch">
1.1 deraadt 151: A source code patch exists which remedies this problem.</a>
152: <p>
1.65 bentley 153: <li id="rst">
1.61 deraadt 154: <font color="#009000"><strong>SECURITY FIX</strong></font>
155: <i>All architectures</i><br>
1.1 deraadt 156: TCP/IP RST handling was too sloppy.
1.47 sthen 157: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch">
1.1 deraadt 158: A source code patch exists which remedies this problem.</a>
159: <p>
1.65 bentley 160: <li id="kvm_mkdb">
1.61 deraadt 161: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
162: <i>All architectures</i><br>
1.1 deraadt 163: During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
1.55 deraadt 164: memory".
1.47 sthen 165: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch">
1.1 deraadt 166: A source code patch exists which remedies this problem.</a>
167: <p>
1.65 bentley 168: <li id="nfs3_solaris7">
1.61 deraadt 169: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
170: <i>All architectures</i><br>
1.1 deraadt 171: A problem with writing to NFS version 3 mounted filesystems from Solaris 7
1.31 david 172: hosts exists. Attempts to create files will result in an error such as
1.1 deraadt 173: "Inappropriate file type or format".
1.47 sthen 174: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch">
1.1 deraadt 175: A source code patch exists which remedies this problem.</a>
176: <p>
1.65 bentley 177: <li id="nfs3">
1.61 deraadt 178: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
179: <i>All architectures</i><br>
1.1 deraadt 180: A problem with NFS version 3 mounts on big endian machines (m68k, sparc
181: and powerpc) exists when mounting filesystems larger than 2gig. You
182: can see evidence of the bug by running df(1) and checking for negative
183: partition sizes.
1.47 sthen 184: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch">
1.1 deraadt 185: A source code patch exists which remedies this problem.</a>
186: <p>
1.65 bentley 187: <li id="termcap">
1.61 deraadt 188: <font color="#009000"><strong>SECURITY FIX</strong></font>
189: <i>All architectures</i><br>
1.1 deraadt 190: A security problem exists in the curses and ocurses libraries that affect
191: setuid programs linked with -lcurses or -locurses.
1.47 sthen 192: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch">
1.1 deraadt 193: A source code patch exists which remedies this problem.</a>
194: <br>
195: Precompiled versions of libcurses and libocurses exist for the
1.47 sthen 196: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz">i386</a>
1.1 deraadt 197: platform. Unpack it in /usr/lib.
198: <p>
1.65 bentley 199: <li id="terminfo">
1.61 deraadt 200: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
201: <i>All architectures</i><br>
1.1 deraadt 202: A workaround for an xterm problem that causes <strong>vi</strong> to not
203: restore the correct cursor position on exit.
1.47 sthen 204: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch">
1.1 deraadt 205: A source code patch exists which remedies this problem.</a>
206: <br>
207: Alternately, you can also download a pre-compiled terminfo file to be
208: installed as <strong>/usr/share/misc/terminfo.db</strong>. For i386,
209: alpha and mips, use the
1.47 sthen 210: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-LE.tar.gz">
1.1 deraadt 211: little endian</a> version. For sparc, m68k and powerpc, use the
1.47 sthen 212: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz">
1.1 deraadt 213: big endian</a> version.
214: <p>
1.65 bentley 215: <li id="userdir">
1.61 deraadt 216: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
217: <i>All architectures</i><br>
1.1 deraadt 218: <strong>userdir</strong> support was accidentally left out of httpd(8).
1.47 sthen 219: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch">
1.1 deraadt 220: A source code patch exists which remedies this problem.</a>
221: <p>
1.65 bentley 222: <li id="bootpd">
1.61 deraadt 223: <font color="#009000"><strong>SECURITY FIX</strong></font>
224: <i>All architectures</i><br>
1.1 deraadt 225: A remotely exploitable problem exists in bootpd(8). bootpd is disabled
226: by default, but some people may actually be using it.
1.47 sthen 227: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch">
1.58 deraadt 228: A source code patch exists which remedies this problem.</a>
229: This is the second version of the patch.
1.1 deraadt 230: <p>
1.65 bentley 231: <li id="tcpfix">
1.61 deraadt 232: <font color="#009000"><strong>SECURITY FIX</strong></font>
233: <i>All architectures</i><br>
1.1 deraadt 234: A remote machine lockup problem exists in the TCP decoding code.
1.47 sthen 235: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch">
1.1 deraadt 236: A source code patch exists which remedies this problem.</a>
237: <p>
1.65 bentley 238: <li id="tss">
1.27 henning 239: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 240: This is another fix for a kernel crash caused by the
241: <strong>crashme</strong> program.
1.47 sthen 242: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch">
1.58 deraadt 243: A source code patch exists which remedies this problem.</a>
1.1 deraadt 244: <p>
1.65 bentley 245: <li id="bootargv">
1.27 henning 246: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 247: The kernel was using a fixed and hard-coded location for the arguments
248: vector passed from the <strong>/boot</strong> loader. This prevented
1.11 jufi 249: <strong>/boot</strong> from placing the boot arguments vector at any
1.1 deraadt 250: other location, causing a kernel crash early in the autoconfiguration
251: stage. In 2.5, the bootblocks will be modified to use a new location.
252: Hence, if you wish old kernels to boot on a new bootblock, those
253: kernels will only work if they were linked with this patch.
1.47 sthen 254: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch">
1.58 deraadt 255: A source code patch exists which remedies this problem.</a>
1.1 deraadt 256: <p>
1.65 bentley 257: <li id="trctrap">
1.27 henning 258: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 259: i386 trace-trap handling when DDB was configured could cause a system
260: crash.
1.47 sthen 261: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch">
1.58 deraadt 262: A source code patch exists which remedies this problem.</a>
1.1 deraadt 263: <p>
1.65 bentley 264: <li id="installboot">
1.27 henning 265: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.13 pvalchev 266: i386 installboot had a sign extension bug which prevented proper bootblock
1.1 deraadt 267: initialization when the root filesystem was placed beyond 4GB.
1.47 sthen 268: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/installboot.patch">
1.58 deraadt 269: A source code patch exists which remedies this problem.</a>
1.1 deraadt 270: Unfortunately, updated 2.4 install floppies are not available. Just ensure
271: that your root filesystem is below 4GB, for now.
272: <p>
1.65 bentley 273: <li id="hme">
1.27 henning 274: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.23 deraadt 275: The sparc hme(4) and be(4) drivers work poorly on some types of SS-20
1.1 deraadt 276: machines. This is because those machines lie, saying they support 64-bit DMA
277: bursting. No sun4m machines support that.
1.47 sthen 278: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch">
1.1 deraadt 279: A source code patch exists which remedies this problem.</a>
280: <p>
1.65 bentley 281: <li id="le">
1.27 henning 282: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.1 deraadt 283: The sparc le(4) driver does media changes incorrectly on one type of
1.55 deraadt 284: sbus le(4) card.
1.47 sthen 285: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch">
1.1 deraadt 286: A source code patch exists which remedies this problem.</a>
287: <p>
1.65 bentley 288: <li id="hp300X">
1.27 henning 289: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 290: The Xhp as shipped does not have the execute permissions set. The fix is
291: 'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X.
292: <p>
293: </ul>
294: <p>
1.56 deraadt 295:
1.66 ! tedu 296: <hr>
! 297:
1.1 deraadt 298: </body>
299: </html>