[BACK]Return to errata25.html CVS log [TXT][DIR] Up to [local] / www

File: [local] / www / errata25.html (download) (as text)

Revision 1.22, Wed Mar 26 01:16:39 2003 UTC (21 years, 2 months ago) by deraadt
Branch: MAIN
Changes since 1.21: +5 -3 lines

do the first half of the 3.3 movearound

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>OpenBSD 2.5 errata</title>
<link rev=made href="mailto:www@openbsd.org">
<meta name="resource-type" content="document">
<meta name="description" content="the OpenBSD CD errata page">
<meta name="keywords" content="openbsd,cd,errata">
<meta name="distribution" content="global">
<meta name="copyright" content="This document copyright 1997-2001 by OpenBSD.">
</head>

<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">

<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
<h2><font color="#0000e0">
This is the OpenBSD 2.5 release errata &amp; patch list:

</font></h2>

<hr>
<a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
<br>
For errata on a certain release, click below:<br>
<a href="errata21.html">2.1</a>,
<a href="errata22.html">2.2</a>,
<a href="errata23.html">2.3</a>,
<a href="errata24.html">2.4</a>,
<a href="errata26.html">2.6</a>,
<a href="errata27.html">2.7</a>,
<a href="errata28.html">2.8</a>,
<a href="errata29.html">2.9</a>,
<a href="errata30.html">3.0</a>,
<a href="errata31.html">3.1</a>,
<a href="errata32.html">3.2</a>,
<a href="errata.html">3.3</a>.
<br>
<hr>

<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5.tar.gz">
You can also fetch a tar.gz file containing all the following patches</a>.
This file is updated once a day.

<p>
For more detailed information on how to install patches to OpenBSD, please
consult the <a href="./faq/faq10.html#10.14">OpenBSD FAQ</a>.

<hr>
<ul>
<dl>
<a name=all></a>
<li><h3><font color="#e00000">All architectures</font></h3>
<ul>
<a name=cron></a>
<li><font color="#009000"><strong>SECURITY FIX: Aug 30, 1999</strong></font><br>
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
run sendmail as the user, not as root.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/012_cron.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=miscfs></a>
<li><font color="#009000"><strong>SECURITY FIX: Aug 12, 1999</strong></font><br>
The procfs and fdescfs filesystems had an overrun in their handling
of uio_offset in their readdir() routines. (These filesystems are not
enabled by default).
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/011_miscfs.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=profil></a>
<li><font color="#009000"><strong>SECURITY FIX: Aug 9, 1999</strong></font><br>
Stop profiling (see profil(2)) when we execve() a new process.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/010_profil.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipsec_in_use></a>
<li><font color="#009000"><strong>SECURITY FIX: Aug 6, 1999</strong></font><br>
Packets that should have been handled by IPsec may be transmitted
as cleartext. PF_KEY SA expirations may leak kernel resources.
<a
href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/009_ipsec_in_use.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=rc></a>
<li><font color="#009000"><strong>SECURITY FIX: Aug 5, 1999</strong></font><br>
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
to use -execdir.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/008_rc.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=chflags></a>
<li><font color="#009000"><strong>SECURITY FIX: Jul 30, 1999</strong></font><br>
Do not permit regular users to chflags(2) or fchflags(2) on character or
block devices which they may currently be the owner of.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/007_chflags.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=nroff></a>
<li><font color="#009000"><strong>SECURITY FIX: Jul 27, 1999</strong></font><br>
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
to avoid various groff features which may be security issues.  On the
whole, this is not really a security issue, but it was discussed on
BUGTRAQ as if it is.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/006_nroff.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=fts></a>
<li><font color="#009000"><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>
Programs using fts(3) could dump core when given a directory structure
with a very large number of entries.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/005_fts.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=tcpsack></a>
<li><font color="#009000"><strong>RELIABILITY FIX: May 19, 1999</strong></font><br>
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
failure to retransmit correctly.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/004_tcpsack.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipsec1></a>
<li><font color="#009000"><strong>RELIABILITY FIX</strong></font><br>
Retransmitted TCP packets could get corrupted when flowing over an
IPSEC ESP tunnel.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/003_espdata.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=bmap></a>
<li><font color="#009000"><strong>RELIABILITY FIX</strong></font><br>
A local user can crash the system by reading a file larger than 64meg 
from an ext2fs partition.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/002_bmap.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=pfkey></a>
<li><font color="#009000"><strong>RELIABILITY FIX</strong></font><br>
PF_KEY socket operations leak internal kernel resources, so that a
system running an IPsec key management daemon like photurisd or isakmpd
will cause the networking subsystem to stop working after a finite amount
of time.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/common/001_pfkey.patch">
A source code patch exists which remedies this problem.</a>
</ul>
<p>
<a name=i386></a>
<li><h3><font color="#e00000">i386</font></h3>
<ul>
<a name=y2k></a>
<li><font color="#009000"><strong>Y2K FIX: Aug 30, 1999</strong></font><br>
This patch corrects various OpenBSD/i386 2.5 problems with Y2K. The 2.6
release (released at 1 Dec 1999) has this problem solved. This patch is
just a workaround.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/i386/014_y2k.patch">
A source code patch exists which remedies this problem.</a>
<p>
<a name=brooktree></a>
<li><font color="#009000"><strong>RELIABILITY FIX</strong></font><br>
If a user opened the brooktree device on a system where it did not exist,
the kernel crashed.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/i386/013_brooktree.patch">
A source code patch exists which remedies this problem.</a>
<p>
</ul>
<a name=mac68k></a>
<li><h3><font color="#e00000">mac68k</font></h3>
<ul>
<a name=macutils></a>
<li><font color="#009000"><strong>INSTALL PROBLEM</strong></font><br>
The mac68k install utils were mistakenly left off the CD and out of
the FTP install directories.  These tools have now been added to the
FTP install directories.  See
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils">
ftp://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils</a>
<p>
</ul>
<p>
<a name=sparc></a>
<li><h3><font color="#e00000">sparc</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=amiga></a>
<li><h3><font color="#e00000">amiga</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=pmax></a>
<li><h3><font color="#e00000">pmax</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=arc></a>
<li><h3><font color="#e00000">arc</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=alpha></a>
<li><h3><font color="#e00000">alpha</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=hp300></a>
<li><h3><font color="#e00000">hp300</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=mvme68k></a>
<li><h3><font color="#e00000">mvme68k</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=powerpc></a>
<li><h3><font color="#e00000">powerpc</font></h3>
<ul>
<a name=powerpc_trap></a>
<li><font color="#009000"><strong>RELIABILITY FIX</strong></font><br>
Two problems in the powerpc kernel trap handling cause severe system
unreliability.
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.5/powerpc/001_trap.patch">
A source code patch exists which remedies these problems.</a>
<p>
</ul>

</dl>
</ul> 
<br>

<hr>
<a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
<br>
For errata on a certain release, click below:<br>
<a href="errata21.html">2.1</a>,
<a href="errata22.html">2.2</a>,
<a href="errata23.html">2.3</a>,
<a href="errata24.html">2.4</a>,
<a href="errata26.html">2.6</a>,
<a href="errata27.html">2.7</a>,
<a href="errata28.html">2.8</a>,
<a href="errata29.html">2.9</a>,
<a href="errata30.html">3.0</a>,
<a href="errata31.html">3.1</a>,
<a href="errata32.html">3.2</a>,
<a href="errata.html">3.3</a>.
<br>

<hr>
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> 
<a href="mailto:www@openbsd.org">www@openbsd.org</a>
<br><small>$OpenBSD: errata25.html,v 1.22 2003/03/26 01:16:39 deraadt Exp $</small>

</body>
</html>