Annotation of www/errata24.html, Revision 1.67
1.24 naddy 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
1.1 deraadt 2: <html>
3: <head>
1.7 deraadt 4: <title>OpenBSD 2.4 errata</title>
1.1 deraadt 5: <meta name="resource-type" content="document">
6: <meta name="description" content="the OpenBSD CD errata page">
7: <meta name="keywords" content="openbsd,cd,errata">
8: <meta name="distribution" content="global">
1.27 henning 9: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.1 deraadt 10: </head>
11:
1.64 deraadt 12: <!--
13: IMPORTANT REMINDER
14: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
15: -->
16:
1.28 david 17: <body bgcolor="#ffffff" text="#000000" link="#23238E">
1.1 deraadt 18:
1.18 jsyn 19: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
1.64 deraadt 20: <h2><font color="#e00000">
21: OpenBSD 2.4 errata
1.1 deraadt 22: </font></h2>
23:
24: <hr>
1.8 jason 25: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
1.20 deraadt 26: <br>
1.21 deraadt 27: For errata on a certain release, click below:<br>
1.20 deraadt 28: <a href="errata21.html">2.1</a>,
29: <a href="errata22.html">2.2</a>,
30: <a href="errata23.html">2.3</a>,
31: <a href="errata25.html">2.5</a>,
32: <a href="errata26.html">2.6</a>,
33: <a href="errata27.html">2.7</a>,
34: <a href="errata28.html">2.8</a>,
35: <a href="errata29.html">2.9</a>,
36: <a href="errata30.html">3.0</a>,
37: <a href="errata31.html">3.1</a>,
1.25 deraadt 38: <a href="errata32.html">3.2</a>,
1.39 david 39: <a href="errata33.html">3.3</a>,
1.30 david 40: <a href="errata34.html">3.4</a>,
1.32 miod 41: <a href="errata35.html">3.5</a>,
1.33 deraadt 42: <a href="errata36.html">3.6</a>,
1.57 deraadt 43: <a href="errata37.html">3.7</a>,
1.42 deraadt 44: <br>
1.35 deraadt 45: <a href="errata38.html">3.8</a>,
1.36 deraadt 46: <a href="errata39.html">3.9</a>,
1.37 deraadt 47: <a href="errata40.html">4.0</a>,
1.40 merdely 48: <a href="errata41.html">4.1</a>,
1.41 deraadt 49: <a href="errata42.html">4.2</a>,
1.42 deraadt 50: <a href="errata43.html">4.3</a>,
1.44 deraadt 51: <a href="errata44.html">4.4</a>,
1.45 deraadt 52: <a href="errata45.html">4.5</a>,
1.46 deraadt 53: <a href="errata46.html">4.6</a>,
1.48 deraadt 54: <a href="errata47.html">4.7</a>,
1.49 miod 55: <a href="errata48.html">4.8</a>,
1.50 nick 56: <a href="errata49.html">4.9</a>,
1.51 sthen 57: <a href="errata50.html">5.0</a>,
1.52 deraadt 58: <a href="errata51.html">5.1</a>,
1.53 deraadt 59: <a href="errata52.html">5.2</a>,
1.54 deraadt 60: <a href="errata53.html">5.3</a>,
1.57 deraadt 61: <br>
1.55 deraadt 62: <a href="errata54.html">5.4</a>,
1.63 jsg 63: <a href="errata55.html">5.5</a>,
1.67 ! deraadt 64: <a href="errata56.html">5.6</a>,
! 65: <a href="errata57.html">5.7</a>.
1.20 deraadt 66: <br>
1.1 deraadt 67: <hr>
68:
1.47 sthen 69: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4.tar.gz">
1.1 deraadt 70: You can also fetch a tar.gz file containing all the following patches</a>.
71: This file is updated once a day.
1.58 deraadt 72: <p>
1.1 deraadt 73:
1.58 deraadt 74: The patches below are available in CVS via the
75: <code>OPENBSD_2_4</code> <a href="stable.html">patch branch</a>.
1.9 ericj 76: <p>
1.58 deraadt 77:
1.22 deraadt 78: For more detailed information on how to install patches to OpenBSD, please
1.58 deraadt 79: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
80: <p>
1.9 ericj 81:
1.1 deraadt 82: <hr>
1.58 deraadt 83:
1.11 jufi 84: <ul>
1.65 bentley 85: <li id="bmap">
1.61 deraadt 86: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
87: <i>All architectures</i><br>
1.3 millert 88: A local user can crash the system by reading a file larger than 64meg
89: from an ext2fs partition.
1.47 sthen 90: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch">
1.3 millert 91: A source code patch exists which remedies this problem.</a>
92: <p>
1.65 bentley 93: <li id="lnpanic">
1.61 deraadt 94: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
95: <i>All architectures</i><br>
1.2 deraadt 96: A local user can crash the system because of a bug in the vfs layer.
1.47 sthen 97: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch">
1.2 deraadt 98: A source code patch exists which remedies this problem.</a>
99: <p>
1.65 bentley 100: <li id="poll">
1.61 deraadt 101: <font color="#009000"><strong>SECURITY FIX</strong></font>
102: <i>All architectures</i><br>
1.1 deraadt 103: A machine crash is possible when playing with poll(2).
1.47 sthen 104: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch">
1.1 deraadt 105: A source code patch exists which remedies this problem.</a>
106: <p>
1.65 bentley 107: <li id="nlink">
1.61 deraadt 108: <font color="#009000"><strong>SECURITY FIX</strong></font>
109: <i>All architectures</i><br>
1.1 deraadt 110: A machine crash is possible when playing with link(2) on FFS.
1.47 sthen 111: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch">
1.58 deraadt 112: A source code patch exists which remedies this problem.</a>
113: This is version four of the patch.
1.1 deraadt 114: <p>
1.65 bentley 115: <li id="ping">
1.61 deraadt 116: <font color="#009000"><strong>SECURITY FIX</strong></font>
117: <i>All architectures</i><br>
1.1 deraadt 118: A buffer overflow existed in ping(8), which may have a security issue.
1.47 sthen 119: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch">
1.1 deraadt 120: A source code patch exists which remedies this problem.</a>
121: <p>
1.65 bentley 122: <li id="ipqrace">
1.61 deraadt 123: <font color="#009000"><strong>SECURITY FIX</strong></font>
124: <i>All architectures</i><br>
1.1 deraadt 125: A race condition in IP ipq handling could permit a remote crash.
1.47 sthen 126: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch">
1.1 deraadt 127: A source code patch exists which remedies this problem.</a>
1.24 naddy 128: It must be installed after <a href="errata24.html#maxqueue">the maxqueue patch</a>.
129: and <a href="errata24.html#tcpfix">the tcp decoding patch</a>.
1.1 deraadt 130: <p>
1.65 bentley 131: <li id="accept">
1.61 deraadt 132: <font color="#009000"><strong>SECURITY FIX</strong></font>
133: <i>All architectures</i><br>
1.1 deraadt 134: A race condition existed between accept(2) and select(2) which could
135: permit an attacker to hang sockets from remote.
1.47 sthen 136: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch">
1.1 deraadt 137: A source code patch exists which remedies this problem.</a>
138: <p>
1.65 bentley 139: <li id="maxqueue">
1.61 deraadt 140: <font color="#009000"><strong>SECURITY FIX</strong></font>
141: <i>All architectures</i><br>
1.1 deraadt 142: IP fragment assembly can bog the machine excessively and cause problems.
1.47 sthen 143: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch">
1.1 deraadt 144: A source code patch exists which remedies this problem.</a>
145: <p>
1.65 bentley 146: <li id="uio">
1.61 deraadt 147: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
148: <i>All architectures</i><br>
1.1 deraadt 149: The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em>
150: with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail.
1.55 deraadt 151: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch">
1.1 deraadt 152: A source code patch exists which remedies this problem.</a>
153: <p>
1.65 bentley 154: <li id="rst">
1.61 deraadt 155: <font color="#009000"><strong>SECURITY FIX</strong></font>
156: <i>All architectures</i><br>
1.1 deraadt 157: TCP/IP RST handling was too sloppy.
1.47 sthen 158: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch">
1.1 deraadt 159: A source code patch exists which remedies this problem.</a>
160: <p>
1.65 bentley 161: <li id="kvm_mkdb">
1.61 deraadt 162: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
163: <i>All architectures</i><br>
1.1 deraadt 164: During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
1.55 deraadt 165: memory".
1.47 sthen 166: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch">
1.1 deraadt 167: A source code patch exists which remedies this problem.</a>
168: <p>
1.65 bentley 169: <li id="nfs3_solaris7">
1.61 deraadt 170: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
171: <i>All architectures</i><br>
1.1 deraadt 172: A problem with writing to NFS version 3 mounted filesystems from Solaris 7
1.31 david 173: hosts exists. Attempts to create files will result in an error such as
1.1 deraadt 174: "Inappropriate file type or format".
1.47 sthen 175: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch">
1.1 deraadt 176: A source code patch exists which remedies this problem.</a>
177: <p>
1.65 bentley 178: <li id="nfs3">
1.61 deraadt 179: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
180: <i>All architectures</i><br>
1.1 deraadt 181: A problem with NFS version 3 mounts on big endian machines (m68k, sparc
182: and powerpc) exists when mounting filesystems larger than 2gig. You
183: can see evidence of the bug by running df(1) and checking for negative
184: partition sizes.
1.47 sthen 185: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch">
1.1 deraadt 186: A source code patch exists which remedies this problem.</a>
187: <p>
1.65 bentley 188: <li id="termcap">
1.61 deraadt 189: <font color="#009000"><strong>SECURITY FIX</strong></font>
190: <i>All architectures</i><br>
1.1 deraadt 191: A security problem exists in the curses and ocurses libraries that affect
192: setuid programs linked with -lcurses or -locurses.
1.47 sthen 193: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch">
1.1 deraadt 194: A source code patch exists which remedies this problem.</a>
195: <br>
196: Precompiled versions of libcurses and libocurses exist for the
1.47 sthen 197: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz">i386</a>
1.1 deraadt 198: platform. Unpack it in /usr/lib.
199: <p>
1.65 bentley 200: <li id="terminfo">
1.61 deraadt 201: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
202: <i>All architectures</i><br>
1.1 deraadt 203: A workaround for an xterm problem that causes <strong>vi</strong> to not
204: restore the correct cursor position on exit.
1.47 sthen 205: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch">
1.1 deraadt 206: A source code patch exists which remedies this problem.</a>
207: <br>
208: Alternately, you can also download a pre-compiled terminfo file to be
209: installed as <strong>/usr/share/misc/terminfo.db</strong>. For i386,
210: alpha and mips, use the
1.47 sthen 211: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-LE.tar.gz">
1.1 deraadt 212: little endian</a> version. For sparc, m68k and powerpc, use the
1.47 sthen 213: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz">
1.1 deraadt 214: big endian</a> version.
215: <p>
1.65 bentley 216: <li id="userdir">
1.61 deraadt 217: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
218: <i>All architectures</i><br>
1.1 deraadt 219: <strong>userdir</strong> support was accidentally left out of httpd(8).
1.47 sthen 220: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch">
1.1 deraadt 221: A source code patch exists which remedies this problem.</a>
222: <p>
1.65 bentley 223: <li id="bootpd">
1.61 deraadt 224: <font color="#009000"><strong>SECURITY FIX</strong></font>
225: <i>All architectures</i><br>
1.1 deraadt 226: A remotely exploitable problem exists in bootpd(8). bootpd is disabled
227: by default, but some people may actually be using it.
1.47 sthen 228: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch">
1.58 deraadt 229: A source code patch exists which remedies this problem.</a>
230: This is the second version of the patch.
1.1 deraadt 231: <p>
1.65 bentley 232: <li id="tcpfix">
1.61 deraadt 233: <font color="#009000"><strong>SECURITY FIX</strong></font>
234: <i>All architectures</i><br>
1.1 deraadt 235: A remote machine lockup problem exists in the TCP decoding code.
1.47 sthen 236: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch">
1.1 deraadt 237: A source code patch exists which remedies this problem.</a>
238: <p>
1.65 bentley 239: <li id="tss">
1.27 henning 240: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 241: This is another fix for a kernel crash caused by the
242: <strong>crashme</strong> program.
1.47 sthen 243: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch">
1.58 deraadt 244: A source code patch exists which remedies this problem.</a>
1.1 deraadt 245: <p>
1.65 bentley 246: <li id="bootargv">
1.27 henning 247: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 248: The kernel was using a fixed and hard-coded location for the arguments
249: vector passed from the <strong>/boot</strong> loader. This prevented
1.11 jufi 250: <strong>/boot</strong> from placing the boot arguments vector at any
1.1 deraadt 251: other location, causing a kernel crash early in the autoconfiguration
252: stage. In 2.5, the bootblocks will be modified to use a new location.
253: Hence, if you wish old kernels to boot on a new bootblock, those
254: kernels will only work if they were linked with this patch.
1.47 sthen 255: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch">
1.58 deraadt 256: A source code patch exists which remedies this problem.</a>
1.1 deraadt 257: <p>
1.65 bentley 258: <li id="trctrap">
1.27 henning 259: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 260: i386 trace-trap handling when DDB was configured could cause a system
261: crash.
1.47 sthen 262: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch">
1.58 deraadt 263: A source code patch exists which remedies this problem.</a>
1.1 deraadt 264: <p>
1.65 bentley 265: <li id="installboot">
1.27 henning 266: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.13 pvalchev 267: i386 installboot had a sign extension bug which prevented proper bootblock
1.1 deraadt 268: initialization when the root filesystem was placed beyond 4GB.
1.47 sthen 269: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/installboot.patch">
1.58 deraadt 270: A source code patch exists which remedies this problem.</a>
1.1 deraadt 271: Unfortunately, updated 2.4 install floppies are not available. Just ensure
272: that your root filesystem is below 4GB, for now.
273: <p>
1.65 bentley 274: <li id="hme">
1.27 henning 275: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.23 deraadt 276: The sparc hme(4) and be(4) drivers work poorly on some types of SS-20
1.1 deraadt 277: machines. This is because those machines lie, saying they support 64-bit DMA
278: bursting. No sun4m machines support that.
1.47 sthen 279: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch">
1.1 deraadt 280: A source code patch exists which remedies this problem.</a>
281: <p>
1.65 bentley 282: <li id="le">
1.27 henning 283: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.1 deraadt 284: The sparc le(4) driver does media changes incorrectly on one type of
1.55 deraadt 285: sbus le(4) card.
1.47 sthen 286: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch">
1.1 deraadt 287: A source code patch exists which remedies this problem.</a>
288: <p>
1.65 bentley 289: <li id="hp300X">
1.27 henning 290: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 291: The Xhp as shipped does not have the execute permissions set. The fix is
292: 'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X.
293: <p>
294: </ul>
295: <p>
1.56 deraadt 296:
1.66 tedu 297: <hr>
298:
1.1 deraadt 299: </body>
300: </html>