Annotation of www/errata24.html, Revision 1.69
1.24 naddy 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
1.1 deraadt 2: <html>
3: <head>
1.7 deraadt 4: <title>OpenBSD 2.4 errata</title>
1.1 deraadt 5: <meta name="description" content="the OpenBSD CD errata page">
1.27 henning 6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.68 sthen 7: <link rel="canonical" href="http://www.openbsd.org/errata24.html">
1.1 deraadt 8: </head>
9:
1.64 deraadt 10: <!--
11: IMPORTANT REMINDER
12: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
13: -->
14:
1.28 david 15: <body bgcolor="#ffffff" text="#000000" link="#23238E">
1.1 deraadt 16:
1.18 jsyn 17: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
1.64 deraadt 18: <h2><font color="#e00000">
19: OpenBSD 2.4 errata
1.1 deraadt 20: </font></h2>
21:
22: <hr>
1.8 jason 23: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
1.20 deraadt 24: <br>
1.21 deraadt 25: For errata on a certain release, click below:<br>
1.20 deraadt 26: <a href="errata21.html">2.1</a>,
27: <a href="errata22.html">2.2</a>,
28: <a href="errata23.html">2.3</a>,
29: <a href="errata25.html">2.5</a>,
30: <a href="errata26.html">2.6</a>,
31: <a href="errata27.html">2.7</a>,
32: <a href="errata28.html">2.8</a>,
33: <a href="errata29.html">2.9</a>,
34: <a href="errata30.html">3.0</a>,
35: <a href="errata31.html">3.1</a>,
1.25 deraadt 36: <a href="errata32.html">3.2</a>,
1.39 david 37: <a href="errata33.html">3.3</a>,
1.30 david 38: <a href="errata34.html">3.4</a>,
1.32 miod 39: <a href="errata35.html">3.5</a>,
1.33 deraadt 40: <a href="errata36.html">3.6</a>,
1.57 deraadt 41: <a href="errata37.html">3.7</a>,
1.42 deraadt 42: <br>
1.35 deraadt 43: <a href="errata38.html">3.8</a>,
1.36 deraadt 44: <a href="errata39.html">3.9</a>,
1.37 deraadt 45: <a href="errata40.html">4.0</a>,
1.40 merdely 46: <a href="errata41.html">4.1</a>,
1.41 deraadt 47: <a href="errata42.html">4.2</a>,
1.42 deraadt 48: <a href="errata43.html">4.3</a>,
1.44 deraadt 49: <a href="errata44.html">4.4</a>,
1.45 deraadt 50: <a href="errata45.html">4.5</a>,
1.46 deraadt 51: <a href="errata46.html">4.6</a>,
1.48 deraadt 52: <a href="errata47.html">4.7</a>,
1.49 miod 53: <a href="errata48.html">4.8</a>,
1.50 nick 54: <a href="errata49.html">4.9</a>,
1.51 sthen 55: <a href="errata50.html">5.0</a>,
1.52 deraadt 56: <a href="errata51.html">5.1</a>,
1.53 deraadt 57: <a href="errata52.html">5.2</a>,
1.54 deraadt 58: <a href="errata53.html">5.3</a>,
1.57 deraadt 59: <br>
1.55 deraadt 60: <a href="errata54.html">5.4</a>,
1.63 jsg 61: <a href="errata55.html">5.5</a>,
1.67 deraadt 62: <a href="errata56.html">5.6</a>,
63: <a href="errata57.html">5.7</a>.
1.20 deraadt 64: <br>
1.1 deraadt 65: <hr>
66:
1.47 sthen 67: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4.tar.gz">
1.1 deraadt 68: You can also fetch a tar.gz file containing all the following patches</a>.
69: This file is updated once a day.
1.58 deraadt 70: <p>
1.1 deraadt 71:
1.58 deraadt 72: The patches below are available in CVS via the
73: <code>OPENBSD_2_4</code> <a href="stable.html">patch branch</a>.
1.9 ericj 74: <p>
1.58 deraadt 75:
1.22 deraadt 76: For more detailed information on how to install patches to OpenBSD, please
1.58 deraadt 77: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
78: <p>
1.9 ericj 79:
1.1 deraadt 80: <hr>
1.58 deraadt 81:
1.11 jufi 82: <ul>
1.65 bentley 83: <li id="bmap">
1.61 deraadt 84: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
85: <i>All architectures</i><br>
1.3 millert 86: A local user can crash the system by reading a file larger than 64meg
87: from an ext2fs partition.
1.47 sthen 88: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bmap.patch">
1.3 millert 89: A source code patch exists which remedies this problem.</a>
90: <p>
1.65 bentley 91: <li id="lnpanic">
1.61 deraadt 92: <font color="#009000"><strong>RELIABILITY FIX</strong></font>
93: <i>All architectures</i><br>
1.2 deraadt 94: A local user can crash the system because of a bug in the vfs layer.
1.47 sthen 95: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/lnpanic.patch">
1.2 deraadt 96: A source code patch exists which remedies this problem.</a>
97: <p>
1.65 bentley 98: <li id="poll">
1.61 deraadt 99: <font color="#009000"><strong>SECURITY FIX</strong></font>
100: <i>All architectures</i><br>
1.1 deraadt 101: A machine crash is possible when playing with poll(2).
1.47 sthen 102: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/poll.patch">
1.1 deraadt 103: A source code patch exists which remedies this problem.</a>
104: <p>
1.65 bentley 105: <li id="nlink">
1.61 deraadt 106: <font color="#009000"><strong>SECURITY FIX</strong></font>
107: <i>All architectures</i><br>
1.1 deraadt 108: A machine crash is possible when playing with link(2) on FFS.
1.47 sthen 109: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nlink.patch">
1.58 deraadt 110: A source code patch exists which remedies this problem.</a>
111: This is version four of the patch.
1.1 deraadt 112: <p>
1.65 bentley 113: <li id="ping">
1.61 deraadt 114: <font color="#009000"><strong>SECURITY FIX</strong></font>
115: <i>All architectures</i><br>
1.1 deraadt 116: A buffer overflow existed in ping(8), which may have a security issue.
1.47 sthen 117: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ping.patch">
1.1 deraadt 118: A source code patch exists which remedies this problem.</a>
119: <p>
1.65 bentley 120: <li id="ipqrace">
1.61 deraadt 121: <font color="#009000"><strong>SECURITY FIX</strong></font>
122: <i>All architectures</i><br>
1.1 deraadt 123: A race condition in IP ipq handling could permit a remote crash.
1.47 sthen 124: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/ipqrace.patch">
1.1 deraadt 125: A source code patch exists which remedies this problem.</a>
1.24 naddy 126: It must be installed after <a href="errata24.html#maxqueue">the maxqueue patch</a>.
127: and <a href="errata24.html#tcpfix">the tcp decoding patch</a>.
1.1 deraadt 128: <p>
1.65 bentley 129: <li id="accept">
1.61 deraadt 130: <font color="#009000"><strong>SECURITY FIX</strong></font>
131: <i>All architectures</i><br>
1.1 deraadt 132: A race condition existed between accept(2) and select(2) which could
133: permit an attacker to hang sockets from remote.
1.47 sthen 134: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/accept.patch">
1.1 deraadt 135: A source code patch exists which remedies this problem.</a>
136: <p>
1.65 bentley 137: <li id="maxqueue">
1.61 deraadt 138: <font color="#009000"><strong>SECURITY FIX</strong></font>
139: <i>All architectures</i><br>
1.1 deraadt 140: IP fragment assembly can bog the machine excessively and cause problems.
1.47 sthen 141: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/maxqueue.patch">
1.1 deraadt 142: A source code patch exists which remedies this problem.</a>
143: <p>
1.65 bentley 144: <li id="uio">
1.61 deraadt 145: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
146: <i>All architectures</i><br>
1.1 deraadt 147: The readv(2) and writev(2) system calls would not accept a <em>struct iovec</em>
148: with an <strong>iov_len</strong> of 0. This causes a db test in perl to fail.
1.55 deraadt 149: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/uio.patch">
1.1 deraadt 150: A source code patch exists which remedies this problem.</a>
151: <p>
1.65 bentley 152: <li id="rst">
1.61 deraadt 153: <font color="#009000"><strong>SECURITY FIX</strong></font>
154: <i>All architectures</i><br>
1.1 deraadt 155: TCP/IP RST handling was too sloppy.
1.47 sthen 156: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/rst.patch">
1.1 deraadt 157: A source code patch exists which remedies this problem.</a>
158: <p>
1.65 bentley 159: <li id="kvm_mkdb">
1.61 deraadt 160: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
161: <i>All architectures</i><br>
1.1 deraadt 162: During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
1.55 deraadt 163: memory".
1.47 sthen 164: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/kvm_mkdb.patch">
1.1 deraadt 165: A source code patch exists which remedies this problem.</a>
166: <p>
1.65 bentley 167: <li id="nfs3_solaris7">
1.61 deraadt 168: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
169: <i>All architectures</i><br>
1.1 deraadt 170: A problem with writing to NFS version 3 mounted filesystems from Solaris 7
1.31 david 171: hosts exists. Attempts to create files will result in an error such as
1.1 deraadt 172: "Inappropriate file type or format".
1.47 sthen 173: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3_solaris7.patch">
1.1 deraadt 174: A source code patch exists which remedies this problem.</a>
175: <p>
1.65 bentley 176: <li id="nfs3">
1.61 deraadt 177: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
178: <i>All architectures</i><br>
1.1 deraadt 179: A problem with NFS version 3 mounts on big endian machines (m68k, sparc
180: and powerpc) exists when mounting filesystems larger than 2gig. You
181: can see evidence of the bug by running df(1) and checking for negative
182: partition sizes.
1.47 sthen 183: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/nfs3.patch">
1.1 deraadt 184: A source code patch exists which remedies this problem.</a>
185: <p>
1.65 bentley 186: <li id="termcap">
1.61 deraadt 187: <font color="#009000"><strong>SECURITY FIX</strong></font>
188: <i>All architectures</i><br>
1.1 deraadt 189: A security problem exists in the curses and ocurses libraries that affect
190: setuid programs linked with -lcurses or -locurses.
1.47 sthen 191: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/termcap.patch">
1.1 deraadt 192: A source code patch exists which remedies this problem.</a>
193: <br>
194: Precompiled versions of libcurses and libocurses exist for the
1.47 sthen 195: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/curses.tar.gz">i386</a>
1.1 deraadt 196: platform. Unpack it in /usr/lib.
197: <p>
1.65 bentley 198: <li id="terminfo">
1.61 deraadt 199: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
200: <i>All architectures</i><br>
1.1 deraadt 201: A workaround for an xterm problem that causes <strong>vi</strong> to not
202: restore the correct cursor position on exit.
1.47 sthen 203: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.src.patch">
1.1 deraadt 204: A source code patch exists which remedies this problem.</a>
205: <br>
206: Alternately, you can also download a pre-compiled terminfo file to be
207: installed as <strong>/usr/share/misc/terminfo.db</strong>. For i386,
208: alpha and mips, use the
1.47 sthen 209: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-LE.tar.gz">
1.1 deraadt 210: little endian</a> version. For sparc, m68k and powerpc, use the
1.47 sthen 211: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/terminfo.db-BE.tar.gz">
1.1 deraadt 212: big endian</a> version.
213: <p>
1.65 bentley 214: <li id="userdir">
1.61 deraadt 215: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font>
216: <i>All architectures</i><br>
1.1 deraadt 217: <strong>userdir</strong> support was accidentally left out of httpd(8).
1.47 sthen 218: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/userdir.patch">
1.1 deraadt 219: A source code patch exists which remedies this problem.</a>
220: <p>
1.65 bentley 221: <li id="bootpd">
1.61 deraadt 222: <font color="#009000"><strong>SECURITY FIX</strong></font>
223: <i>All architectures</i><br>
1.1 deraadt 224: A remotely exploitable problem exists in bootpd(8). bootpd is disabled
225: by default, but some people may actually be using it.
1.47 sthen 226: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/bootpd.patch">
1.58 deraadt 227: A source code patch exists which remedies this problem.</a>
228: This is the second version of the patch.
1.1 deraadt 229: <p>
1.65 bentley 230: <li id="tcpfix">
1.61 deraadt 231: <font color="#009000"><strong>SECURITY FIX</strong></font>
232: <i>All architectures</i><br>
1.1 deraadt 233: A remote machine lockup problem exists in the TCP decoding code.
1.47 sthen 234: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/common/tcpfix.patch">
1.1 deraadt 235: A source code patch exists which remedies this problem.</a>
236: <p>
1.65 bentley 237: <li id="tss">
1.27 henning 238: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 239: This is another fix for a kernel crash caused by the
240: <strong>crashme</strong> program.
1.47 sthen 241: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/tss.patch">
1.58 deraadt 242: A source code patch exists which remedies this problem.</a>
1.1 deraadt 243: <p>
1.65 bentley 244: <li id="bootargv">
1.27 henning 245: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 246: The kernel was using a fixed and hard-coded location for the arguments
247: vector passed from the <strong>/boot</strong> loader. This prevented
1.11 jufi 248: <strong>/boot</strong> from placing the boot arguments vector at any
1.1 deraadt 249: other location, causing a kernel crash early in the autoconfiguration
250: stage. In 2.5, the bootblocks will be modified to use a new location.
251: Hence, if you wish old kernels to boot on a new bootblock, those
252: kernels will only work if they were linked with this patch.
1.47 sthen 253: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/bootargv.patch">
1.58 deraadt 254: A source code patch exists which remedies this problem.</a>
1.1 deraadt 255: <p>
1.65 bentley 256: <li id="trctrap">
1.27 henning 257: <font color="#009000"><strong>SECURITY FIX</strong></font><br>
1.1 deraadt 258: i386 trace-trap handling when DDB was configured could cause a system
259: crash.
1.47 sthen 260: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/trctrap.patch">
1.58 deraadt 261: A source code patch exists which remedies this problem.</a>
1.1 deraadt 262: <p>
1.65 bentley 263: <li id="installboot">
1.27 henning 264: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.13 pvalchev 265: i386 installboot had a sign extension bug which prevented proper bootblock
1.1 deraadt 266: initialization when the root filesystem was placed beyond 4GB.
1.47 sthen 267: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/i386/installboot.patch">
1.58 deraadt 268: A source code patch exists which remedies this problem.</a>
1.1 deraadt 269: Unfortunately, updated 2.4 install floppies are not available. Just ensure
270: that your root filesystem is below 4GB, for now.
271: <p>
1.65 bentley 272: <li id="hme">
1.27 henning 273: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.23 deraadt 274: The sparc hme(4) and be(4) drivers work poorly on some types of SS-20
1.1 deraadt 275: machines. This is because those machines lie, saying they support 64-bit DMA
276: bursting. No sun4m machines support that.
1.47 sthen 277: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/hme.patch">
1.1 deraadt 278: A source code patch exists which remedies this problem.</a>
279: <p>
1.65 bentley 280: <li id="le">
1.27 henning 281: <font color="#009000"><strong>DRIVER FIX</strong></font><br>
1.1 deraadt 282: The sparc le(4) driver does media changes incorrectly on one type of
1.55 deraadt 283: sbus le(4) card.
1.47 sthen 284: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.4/sparc/le.patch">
1.1 deraadt 285: A source code patch exists which remedies this problem.</a>
286: <p>
1.65 bentley 287: <li id="hp300X">
1.27 henning 288: <font color="#009000"><strong>FUNCTIONALITY FIX</strong></font><br>
1.1 deraadt 289: The Xhp as shipped does not have the execute permissions set. The fix is
290: 'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X.
291: <p>
292: </ul>
293: <p>
1.56 deraadt 294:
1.66 tedu 295: <hr>
296:
1.1 deraadt 297: </body>
298: </html>