version 1.85, 2019/05/27 22:55:19 |
version 1.86, 2019/05/28 16:32:41 |
|
|
<hr> |
<hr> |
|
|
<ul> |
<ul> |
<li id="semconfig"> |
|
<strong>024: SECURITY FIX: May 26, 2000</strong> |
<li id="newsyslog"> |
|
<strong>001: RELIABILITY FIX: Nov 8, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Kernel contained an undocumented system call used to lock semaphore operations |
A race condition in newsyslog(8) can cause errors in log file rotation.<br> |
while they were being sampled by the ipcs(1) command. This locking could be |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/001_newsyslog.patch"> |
used as a local denial of service attack which would block the exiting of |
|
processes which had semaphore resources allocated. Processes not using |
|
semaphores are not affected, so the actual effect is very minimal.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/024_sysv_sem.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ipf"> |
|
<strong>023: SECURITY FIX: May 25, 2000</strong> |
<li id="ifmedia"> |
|
<strong>002: SECURITY FIX: Nov 9, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A misuse of ipf(8) |
Any user can change interface media configurations.<br> |
<i>keep-state</i> rules can result in firewall rules being |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/002_ifmedia.patch"> |
bypassed. |
|
This patch also includes fixes for an unaligned timestamp issue, |
|
and reliability fixes for ipmon and the in-kernel ftp proxy.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/023_ipf.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
It updates ipf to version 3.3.16. |
|
<p> |
<p> |
<li id="xlockmore"> |
|
<strong>022: SECURITY FIX: May 25, 2000</strong> |
<li id="m4"> |
|
<strong>003: FUNCTIONALITY FIX: Nov 10, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
xlockmore has a localhost attack against it which allows recovery of the encrypted |
m4 is quite broken in the 2.6 release.<br> |
hash of the root password. The damage to systems using DES passwords from this |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/003_m4.patch"> |
attack is pretty heavy, but to systems with a well-chosen root password under |
|
blowfish encoding |
|
(see <a href="https://man.openbsd.org/OpenBSD-2.6/crypt.3"> |
|
crypt(3)</a>) |
|
the impact is much reduced.<br> |
|
(Aside: We do not consider this a localhost root hole in the default install, |
|
since we have not seen a fast blowfish cracker yet ;-)<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/022_xlockmore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
This is the 2nd patch designed to solve this problem. |
This is the 3rd revision of the patch. |
<p> |
<p> |
<li id="rzsz"> |
|
<strong>021: RZSZ SNOOPING: Jan 31, 2000</strong> |
<li id="sparc_locore"> |
|
<strong>004: RELIABILITY FIX: Nov 12, 1999</strong> |
|
<i>sparc only</i><br> |
|
The sparc kernel can be crashed by a user.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/004_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="sshjumbo"> |
|
<strong>005: FUNCTIONALITY ADDITION: Nov 11, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The rzsz port was removed from the ports collection, as it collects and |
Various OpenSSH improvements have been made since the 2.6 release shipped.<br> |
sends user information to a designated email address, effectively spying on |
To resolve the various (non-security related) features which users may want, |
you. <em>It is recommended that you remove this package if you installed |
we are making a jumbo patch available. <b>This is now at VERSION FOUR.</b><br> |
it</em>. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/005_sshjumbo.patch"> |
|
Revision 4 of this jumbo source code patch exists.</a><br> |
|
<b>NOTE: /etc/sshd_config and /etc/ssh_config may need changes.</b> |
<p> |
<p> |
<li id="syslog"> |
|
<strong>020: LIBRARY IMPROVEMENT: Jan 26, 2000</strong> |
<li id="alpha_locore"> |
|
<strong>006: RELIABILITY FIX: Nov 13, 1999</strong> |
|
<i>alpha only</i><br> |
|
The alpha kernel can possibly be crashed by a user.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/alpha/006_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="hp300_locore"> |
|
<strong>007: RELIABILITY FIX: Nov 12, 1999</strong> |
|
<i>m68k architectures</i><br> |
|
All m68k kernels can possibly be crashed by a user.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="atapijumbo"> |
|
<strong>009: DRIVER IMPROVEMENTS: Dec 4, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
syslog(3) would not try to reopen the socket, thus, nightly newsyslog(8) |
Various improvements have been made to the IDE/ATAPI subsystem since |
would cause syslogd(8) to not see new messages. |
the 2.6 release shipped.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/020_syslog.patch"> |
Some of these improvements make some recalcitrant devices work much better. |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/009_atapi.patch"><br> |
|
Revision 1 of this jumbo source code patch exists.</a><br> |
|
<p> |
|
|
|
<li id="sendmail"> |
|
<strong>010: SECURITY FIX: Dec 4, 1999</strong> |
|
<i>All architectures</i><br> |
|
Sendmail had a race in aliases file handling, which this patch fixes.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/010_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="nsphy"> |
|
<strong>019: DRIVER IMPROVEMENT: Jan 20, 2000</strong> |
<li id="poll"> |
|
<strong>011: SECURITY FIX: Dec 4, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Intel fxp cards with National Semiconductor PHYs (nsphy) have trouble |
Various bugs in poll(2) may cause a kernel crash.<br> |
negotiating and maintaining 100Mb link integrity.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/011_poll.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/019_nsphy.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="procfs"> |
|
<strong>018: SECURITY FIX: Jan 20, 2000</strong> |
<li id="packets3c900b"> |
|
<strong>012: DRIVER IMPROVEMENT: Jan 3, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Systems running with procfs enabled and mounted are vulnerable |
The 3C900B-TPO fails to select the correct media type (it never sees or |
to having the stderr output of setuid processes directed onto |
sends packets).<br> |
a pre-seeked descriptor onto the stack in their own procfs memory.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_3c900b.patch"> |
Note that procfs is not mounted by default in OpenBSD.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/018_procfs.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="fortran"> |
|
<strong>017: FUNCTIONALITY ADDITION: Nov 14, 1999</strong> |
<li id="addusery2k"> |
|
<strong>013: Y2K FIX: Jan 3, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fortran doesn't work right. The file /usr/include/g2c.h is missing in the |
A minor problem in the logging support for the adduser(8) command.<br> |
release.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/013_addusery2k.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/008_fortran.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
The patch fixes the source tree and describes how to properly add |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/g2c.h"> |
|
the include file</a> to your system. |
|
<p> |
<p> |
|
|
|
<li id="eepromy2k"> |
|
<strong>014: Y2K FIX: Jan 3, 2000</strong><br> |
|
A minor problem; the sparc eeprom(8) command is not Y2K compliant.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/014_eepromy2k.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
This is the second revision of the patch. |
|
<p> |
|
|
|
<li id="aty2k"> |
|
<strong>015: Y2K FIX: Jan 9, 2000</strong> |
|
<i>All architectures</i><br> |
|
The at(1) command was unable to parse some kinds of dates.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/015_aty2k.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
<li id="sslUSA"> |
<li id="sslUSA"> |
<strong>016: SECURITY FIX: Dec 2, 1999</strong> |
<strong>016: SECURITY FIX: Dec 2, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
|
|
<a href="advisories/sslUSA">For more information, see the advisory</a>.<br> |
<a href="advisories/sslUSA">For more information, see the advisory</a>.<br> |
<b>NOTE: this problem turned out to not be unexploitable in OpenSSH.</b> |
<b>NOTE: this problem turned out to not be unexploitable in OpenSSH.</b> |
<p> |
<p> |
<li id="aty2k"> |
|
<strong>015: Y2K FIX: Jan 9, 2000</strong> |
<li id="fortran"> |
|
<strong>017: FUNCTIONALITY ADDITION: Nov 14, 1999</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The at(1) command was unable to parse some kinds of dates.<br> |
Fortran doesn't work right. The file /usr/include/g2c.h is missing in the |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/015_aty2k.patch"> |
release.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/008_fortran.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
The patch fixes the source tree and describes how to properly add |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/g2c.h"> |
|
the include file</a> to your system. |
<p> |
<p> |
<li id="eepromy2k"> |
|
<strong>014: Y2K FIX: Jan 3, 2000</strong><br> |
<li id="procfs"> |
A minor problem; the sparc eeprom(8) command is not Y2K compliant.<br> |
<strong>018: SECURITY FIX: Jan 20, 2000</strong> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/014_eepromy2k.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
This is the second revision of the patch. |
|
<p> |
|
<li id="addusery2k"> |
|
<strong>013: Y2K FIX: Jan 3, 2000</strong> |
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A minor problem in the logging support for the adduser(8) command.<br> |
Systems running with procfs enabled and mounted are vulnerable |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/013_addusery2k.patch"> |
to having the stderr output of setuid processes directed onto |
|
a pre-seeked descriptor onto the stack in their own procfs memory.<br> |
|
Note that procfs is not mounted by default in OpenBSD.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/018_procfs.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="packets3c900b"> |
|
<strong>012: DRIVER IMPROVEMENT: Jan 3, 2000</strong> |
<li id="syslog"> |
|
<strong>020: LIBRARY IMPROVEMENT: Jan 26, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The 3C900B-TPO fails to select the correct media type (it never sees or |
syslog(3) would not try to reopen the socket, thus, nightly newsyslog(8) |
sends packets).<br> |
would cause syslogd(8) to not see new messages. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_3c900b.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/020_syslog.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="poll"> |
|
<strong>011: SECURITY FIX: Dec 4, 1999</strong> |
<li id="nsphy"> |
|
<strong>019: DRIVER IMPROVEMENT: Jan 20, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Various bugs in poll(2) may cause a kernel crash.<br> |
Intel fxp cards with National Semiconductor PHYs (nsphy) have trouble |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/011_poll.patch"> |
negotiating and maintaining 100Mb link integrity.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/019_nsphy.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="sendmail"> |
|
<strong>010: SECURITY FIX: Dec 4, 1999</strong> |
<li id="rzsz"> |
|
<strong>021: RZSZ SNOOPING: Jan 31, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Sendmail had a race in aliases file handling, which this patch fixes.<br> |
The rzsz port was removed from the ports collection, as it collects and |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/010_sendmail.patch"> |
sends user information to a designated email address, effectively spying on |
A source code patch exists which remedies this problem.</a> |
you. <em>It is recommended that you remove this package if you installed |
|
it</em>. |
<p> |
<p> |
<li id="atapijumbo"> |
|
<strong>009: DRIVER IMPROVEMENTS: Dec 4, 1999</strong> |
<li id="xlockmore"> |
|
<strong>022: SECURITY FIX: May 25, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Various improvements have been made to the IDE/ATAPI subsystem since |
xlockmore has a localhost attack against it which allows recovery of the encrypted |
the 2.6 release shipped.<br> |
hash of the root password. The damage to systems using DES passwords from this |
Some of these improvements make some recalcitrant devices work much better. |
attack is pretty heavy, but to systems with a well-chosen root password under |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/009_atapi.patch"><br> |
blowfish encoding |
Revision 1 of this jumbo source code patch exists.</a><br> |
(see <a href="https://man.openbsd.org/OpenBSD-2.6/crypt.3"> |
<p> |
crypt(3)</a>) |
<li id="hp300_locore"> |
the impact is much reduced.<br> |
<strong>007: RELIABILITY FIX: Nov 12, 1999</strong> |
(Aside: We do not consider this a localhost root hole in the default install, |
<i>m68k architectures</i><br> |
since we have not seen a fast blowfish cracker yet ;-)<br> |
All m68k kernels can possibly be crashed by a user.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/022_xlockmore.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
This is the 2nd patch designed to solve this problem. |
<p> |
<p> |
<li id="alpha_locore"> |
|
<strong>006: RELIABILITY FIX: Nov 13, 1999</strong> |
<li id="ipf"> |
<i>alpha only</i><br> |
<strong>023: SECURITY FIX: May 25, 2000</strong> |
The alpha kernel can possibly be crashed by a user.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/alpha/006_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<li id="sshjumbo"> |
|
<strong>005: FUNCTIONALITY ADDITION: Nov 11, 1999</strong> |
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Various OpenSSH improvements have been made since the 2.6 release shipped.<br> |
A misuse of ipf(8) |
To resolve the various (non-security related) features which users may want, |
<i>keep-state</i> rules can result in firewall rules being |
we are making a jumbo patch available. <b>This is now at VERSION FOUR.</b><br> |
bypassed. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/005_sshjumbo.patch"> |
This patch also includes fixes for an unaligned timestamp issue, |
Revision 4 of this jumbo source code patch exists.</a><br> |
and reliability fixes for ipmon and the in-kernel ftp proxy.<br> |
<b>NOTE: /etc/sshd_config and /etc/ssh_config may need changes.</b> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/023_ipf.patch"> |
<p> |
|
<li id="sparc_locore"> |
|
<strong>004: RELIABILITY FIX: Nov 12, 1999</strong> |
|
<i>sparc only</i><br> |
|
The sparc kernel can be crashed by a user.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/004_locore.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
It updates ipf to version 3.3.16. |
<p> |
<p> |
<li id="m4"> |
|
<strong>003: FUNCTIONALITY FIX: Nov 10, 1999</strong> |
<li id="semconfig"> |
|
<strong>024: SECURITY FIX: May 26, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
m4 is quite broken in the 2.6 release.<br> |
Kernel contained an undocumented system call used to lock semaphore operations |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/003_m4.patch"> |
while they were being sampled by the ipcs(1) command. This locking could be |
A source code patch exists which remedies this problem.</a> |
used as a local denial of service attack which would block the exiting of |
This is the 3rd revision of the patch. |
processes which had semaphore resources allocated. Processes not using |
<p> |
semaphores are not affected, so the actual effect is very minimal.<br> |
<li id="ifmedia"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/024_sysv_sem.patch"> |
<strong>002: SECURITY FIX: Nov 9, 1999</strong> |
|
<i>All architectures</i><br> |
|
Any user can change interface media configurations.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/002_ifmedia.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<li id="newsyslog"> |
|
<strong>001: RELIABILITY FIX: Nov 8, 1999</strong> |
|
<i>All architectures</i><br> |
|
A race condition in newsyslog(8) can cause errors in log file rotation.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/001_newsyslog.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|