[BACK]Return to errata25.html CVS log [TXT][DIR] Up to [local] / www

File: [local] / www / errata25.html (download) (as text)

Revision 1.1, Tue Nov 9 09:00:35 1999 UTC (24 years, 6 months ago) by deraadt
Branch: MAIN

move towards 2.6...

<!DOCTYPE HTML PUBLIC  "-//IETF//DTD HTML Strict//EN">
<html>
<head>
<title>OpenBSD release errata</title>
<link rev=made href=mailto:www@openbsd.org>
<meta name="resource-type" content="document">
<meta name="description" content="the OpenBSD CD errata page">
<meta name="keywords" content="openbsd,cd,errata">
<meta name="distribution" content="global">
<meta name="copyright" content="This document copyright 1997-1998 by OpenBSD.">
</head>

<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">

<img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif">
<h2><font color=#0000e0>
This is the OpenBSD 2.5 release errata &amp; patch list:

</font></h2>

<hr>
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
<a href=errata.html>For 2.6 errata, please refer here</a>.<br>
<hr>

<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5.tar.gz>
You can also fetch a tar.gz file containing all the following patches</a>.
This file is updated once a day.

<hr>

<dl>
<a name=all></a>
<li><h3><font color=#e00000>All architectures</font></h3>
<ul>
<a name=cron></a>
<li><font color=#009000><strong>SECURITY FIX: Aug 30, 1999</strong></font><br>
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
run sendmail as the user, not as root.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/012_cron.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=miscfs></a>
<li><font color=#009000><strong>SECURITY FIX: Aug 12, 1999</strong></font><br>
The procfs and fdescfs filesystems had an overrun in their handling
of uio_offset in their readdir() routines. (These filesystems are not
enabled by default).
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/011_miscfs.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=profil></a>
<li><font color=#009000><strong>SECURITY FIX: Aug 9, 1999</strong></font><br>
Stop profiling (see profil(2)) when we execve() a new process.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipsec_in_use></a>
<li><font color=#009000><strong>SECURITY FIX: Aug 6, 1999</strong></font><br>
Packets that should have been handled by IPsec may be transmitted
as cleartext. PF_KEY SA expirations may leak kernel resources.
<a
href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/009_ipsec_in_use.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=rc></a>
<li><font color=#009000><strong>SECURITY FIX: Aug 5, 1999</strong></font><br>
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
to use -execdir.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/008_rc.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=chflags></a>
<li><font color=#009000><strong>SECURITY FIX: Jul 30, 1999</strong></font><br>
Do not permit regular users to chflags(2) or fchflags(2) on character or
block devices which they may currently be the owner of.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/007_chflags.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=nroff></a>
<li><font color=#009000><strong>SECURITY FIX: Jul 27, 1999</strong></font><br>
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
to avoid various groff features which may be security issues.  On the
whole, this is not really a security issue, but it was discussed on
BUGTRAQ as if it is.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/006_nroff.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=fts></a>
<li><font color=#009000><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>
Programs using fts(3) could dump core when given a directory structure
with a very large number of entries.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/005_fts.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=tcpsack></a>
<li><font color=#009000><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
failure to retransmit correctly.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/004_tcpsack.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipsec1></a>
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>
Retransmitted TCP packets could get corrupted when flowing over an
IPSEC ESP tunnel.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/003_espdata.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=bmap></a>
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>
A local user can crash the system by reading a file larger than 64meg 
from an ext2fs partition.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/002_bmap.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=pfkey></a>
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>
PF_KEY socket operations leak internal kernel resources, so that a
system running an IPsec keymanagement daemon like photurisd or isakmpd
will cause the networking subsystem to stop working after a finite amount
of time.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/001_pfkey.patch>
A source code patch exists which remedies this problem.</a>
</ul>
<p>
<a name=i386></a>
<li><h3><font color=#e00000>i386</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=mac68k></a>
<li><h3><font color=#e00000>mac68k</font></h3>
<ul>
<a name=macutils></a>
<li><font color=#009000><strong>INSTALL PROBLEM</strong></font><br>
The mac68k install utils were mistakenly left off the CD and out of
the FTP install directories.  These tools have now been added to the
FTP install directories.  See
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils>
ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils</a>
<p>
</ul>
<p>
<a name=sparc></a>
<li><h3><font color=#e00000>sparc</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=amiga></a>
<li><h3><font color=#e00000>amiga</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=pmax></a>
<li><h3><font color=#e00000>pmax</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=arc></a>
<li><h3><font color=#e00000>arc</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=alpha></a>
<li><h3><font color=#e00000>alpha</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=hp300></a>
<li><h3><font color=#e00000>hp300</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=mvme68k></a>
<li><h3><font color=#e00000>mvme68k</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=powerpc></a>
<li><h3><font color=#e00000>powerpc</font></h3>
<ul>
<a name=powerpc_trap></a>
<li><font color=#009000><strong>RELIABILITY FIX</strong></font><br>
Two problems in the powerpc kernel trap handling cause severe system
unreliability.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch>
A source code patch exists which remedies these problems.</a>
<p>
</ul>

</dl>
<br>

<hr>
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
<a href=errata.html>For 2.6 errata, please refer here</a>.<br>
<hr>

<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> 
<a href=mailto:www@openbsd.org>www@openbsd.org</a>
<br><small>$OpenBSD: errata25.html,v 1.1 1999/11/09 09:00:35 deraadt Exp $</small>

</body>
</html>