version 1.77, 2019/04/02 12:46:56 |
version 1.78, 2019/05/27 22:55:19 |
|
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> |
<!doctype html> |
<html> |
<html lang=en id=errata> |
<head> |
<meta charset=utf-8> |
|
|
<title>OpenBSD 2.5 Errata</title> |
<title>OpenBSD 2.5 Errata</title> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> |
|
<meta name="viewport" content="width=device-width, initial-scale=1"> |
<meta name="viewport" content="width=device-width, initial-scale=1"> |
<link rel="stylesheet" type="text/css" href="openbsd.css"> |
<link rel="stylesheet" type="text/css" href="openbsd.css"> |
<link rel="canonical" href="https://www.openbsd.org/errata25.html"> |
<link rel="canonical" href="https://www.openbsd.org/errata25.html"> |
</head> |
|
|
|
<!-- |
<!-- |
IMPORTANT REMINDER |
IMPORTANT REMINDER |
IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE |
IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE |
--> |
--> |
|
|
<body bgcolor="#ffffff" text="#000000" link="#23238E"> |
|
|
|
<h2> |
<h2 id=OpenBSD> |
<a href="index.html"> |
<a href="index.html"> |
<font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a> |
<i>Open</i><b>BSD</b></a> |
<font color="#e00000">2.5 Errata</font> |
2.5 Errata |
</h2> |
</h2> |
<hr> |
<hr> |
|
|
|
|
|
|
<ul> |
<ul> |
<li id="cron"> |
<li id="cron"> |
<font color="#009000"><strong>SECURITY FIX: Aug 30, 1999</strong></font> |
<strong>SECURITY FIX: Aug 30, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
In cron(8), make sure argv[] is NULL terminated in the fake popen() and |
In cron(8), make sure argv[] is NULL terminated in the fake popen() and |
run sendmail as the user, not as root. |
run sendmail as the user, not as root. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="miscfs"> |
<li id="miscfs"> |
<font color="#009000"><strong>SECURITY FIX: Aug 12, 1999</strong></font> |
<strong>SECURITY FIX: Aug 12, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The procfs and fdescfs filesystems had an overrun in their handling |
The procfs and fdescfs filesystems had an overrun in their handling |
of uio_offset in their readdir() routines. (These filesystems are not |
of uio_offset in their readdir() routines. (These filesystems are not |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="profil"> |
<li id="profil"> |
<font color="#009000"><strong>SECURITY FIX: Aug 9, 1999</strong></font> |
<strong>SECURITY FIX: Aug 9, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Stop profiling (see profil(2)) when we execve() a new process. |
Stop profiling (see profil(2)) when we execve() a new process. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ipsec_in_use"> |
<li id="ipsec_in_use"> |
<font color="#009000"><strong>SECURITY FIX: Aug 6, 1999</strong></font> |
<strong>SECURITY FIX: Aug 6, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Packets that should have been handled by IPsec may be transmitted |
Packets that should have been handled by IPsec may be transmitted |
as cleartext. PF_KEY SA expirations may leak kernel resources. |
as cleartext. PF_KEY SA expirations may leak kernel resources. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="rc"> |
<li id="rc"> |
<font color="#009000"><strong>SECURITY FIX: Aug 5, 1999</strong></font> |
<strong>SECURITY FIX: Aug 5, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1) |
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1) |
to use -execdir. |
to use -execdir. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="chflags"> |
<li id="chflags"> |
<font color="#009000"><strong>SECURITY FIX: Jul 30, 1999</strong></font> |
<strong>SECURITY FIX: Jul 30, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Do not permit regular users to chflags(2) or fchflags(2) on character or |
Do not permit regular users to chflags(2) or fchflags(2) on character or |
block devices which they may currently be the owner of. |
block devices which they may currently be the owner of. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="nroff"> |
<li id="nroff"> |
<font color="#009000"><strong>SECURITY FIX: Jul 27, 1999</strong></font> |
<strong>SECURITY FIX: Jul 27, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Cause groff(1) to be invoked with the -S flag, when called by nroff(1), |
Cause groff(1) to be invoked with the -S flag, when called by nroff(1), |
to avoid various groff features which may be security issues. On the |
to avoid various groff features which may be security issues. On the |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="fts"> |
<li id="fts"> |
<font color="#009000"><strong>RELIABILITY FIX: May 19, 1999</strong></font> |
<strong>RELIABILITY FIX: May 19, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Programs using fts(3) could dump core when given a directory structure |
Programs using fts(3) could dump core when given a directory structure |
with a very large number of entries. |
with a very large number of entries. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="tcpsack"> |
<li id="tcpsack"> |
<font color="#009000"><strong>RELIABILITY FIX: May 19, 1999</strong></font> |
<strong>RELIABILITY FIX: May 19, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in |
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in |
failure to retransmit correctly. |
failure to retransmit correctly. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ipsec1"> |
<li id="ipsec1"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<strong>RELIABILITY FIX</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Retransmitted TCP packets could get corrupted when flowing over an |
Retransmitted TCP packets could get corrupted when flowing over an |
IPSEC ESP tunnel. |
IPSEC ESP tunnel. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="bmap"> |
<li id="bmap"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<strong>RELIABILITY FIX</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A local user can crash the system by reading a file larger than 64meg |
A local user can crash the system by reading a file larger than 64meg |
from an ext2fs partition. |
from an ext2fs partition. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="pfkey"> |
<li id="pfkey"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font> |
<strong>RELIABILITY FIX</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
PF_KEY socket operations leak internal kernel resources, so that a |
PF_KEY socket operations leak internal kernel resources, so that a |
system running an IPsec key management daemon like photurisd or isakmpd |
system running an IPsec key management daemon like photurisd or isakmpd |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="y2k"> |
<li id="y2k"> |
<font color="#009000"><strong>Y2K FIX: Aug 30, 1999</strong></font><br> |
<strong>Y2K FIX: Aug 30, 1999</strong><br> |
This patch corrects various OpenBSD/i386 2.5 problems with Y2K. The 2.6 |
This patch corrects various OpenBSD/i386 2.5 problems with Y2K. The 2.6 |
release (released at 1 Dec 1999) has this problem solved. This patch is |
release (released at 1 Dec 1999) has this problem solved. This patch is |
just a workaround. |
just a workaround. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="brooktree"> |
<li id="brooktree"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font><br> |
<strong>RELIABILITY FIX</strong><br> |
If a user opened the brooktree device on a system where it did not exist, |
If a user opened the brooktree device on a system where it did not exist, |
the kernel crashed. |
the kernel crashed. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/i386/013_brooktree.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/i386/013_brooktree.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="macutils"> |
<li id="macutils"> |
<font color="#009000"><strong>INSTALL PROBLEM</strong></font><br> |
<strong>INSTALL PROBLEM</strong><br> |
The mac68k install utils were mistakenly left off the CD and out of |
The mac68k install utils were mistakenly left off the CD and out of |
the FTP install directories. These tools have now been added to the |
the FTP install directories. These tools have now been added to the |
FTP install directories. See |
FTP install directories. See |
|
|
https://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils</a> |
https://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils</a> |
<p> |
<p> |
<li id="powerpc_trap"> |
<li id="powerpc_trap"> |
<font color="#009000"><strong>RELIABILITY FIX</strong></font><br> |
<strong>RELIABILITY FIX</strong><br> |
Two problems in the powerpc kernel trap handling cause severe system |
Two problems in the powerpc kernel trap handling cause severe system |
unreliability. |
unreliability. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch"> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |
|
|
</body> |
|
</html> |
|