Annotation of www/errata26.html, Revision 1.7
1.1 deraadt 1: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML Strict//EN">
2: <html>
3: <head>
4: <title>OpenBSD 2.6 errata</title>
5: <link rev=made href=mailto:www@openbsd.org>
6: <meta name="resource-type" content="document">
7: <meta name="description" content="the OpenBSD CD errata page">
8: <meta name="keywords" content="openbsd,cd,errata">
9: <meta name="distribution" content="global">
10: <meta name="copyright" content="This document copyright 1997-1998 by OpenBSD.">
11: </head>
12:
13: <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">
14:
15: <img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif">
16: <h2><font color=#0000e0>
17: This is the OpenBSD 2.6 release errata & patch list:
18:
19: </font></h2>
20:
21: <hr>
22: <a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
23: <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
24: <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
25: <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
26: <a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
27: <a href=errata.html>For 2.7 errata, please refer here</a>.<br>
28: <hr>
29:
30: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6.tar.gz>
31: You can also fetch a tar.gz file containing all the following patches</a>.
32: This file is updated once a day.
33:
34: <hr>
35:
36: <dl>
37: <a name=all></a>
38: <li><h3><font color=#e00000>All architectures</font></h3>
39: <ul>
1.7 ! deraadt 40: <a name=semconfig></a>
! 41: <li><font color=#009000><strong>024: SECURITY FIX: May 26, 2000</strong></font><br>
! 42: Kernel contained an undocumented system call used to lock semaphore operations
! 43: while they were being sampled by the ipcs(1) command. This locking could be
! 44: used as a local denial of service attack which would block processes from
! 45: exiting.<br>
! 46: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/024_sysv_sem.patch>
! 47: A jumbo patch exists which remedies this problem.</a>
! 48: <p>
1.4 kjell 49: <a name=ipf></a>
50: <li><font color=#009000><strong>023: SECURITY FIX: May 25, 2000</strong></font><br>
1.5 deraadt 51: A misuse of
52: <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ipf&sektion=8">ipf(8)</a>
1.4 kjell 53: <i>keep-state</i> rules can result in firewall rules being
1.5 deraadt 54: bypassed.
55: This patch also includes fixes for an unaligned timestamp issue,
1.4 kjell 56: and reliability fixes for ipmon and the in-kernel ftp proxy.<br>
57: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/023_ipf.patch>
58: A jumbo patch exists</a>, which remedies this problem, and updates ipf
59: to version 3.3.16.
60: <p>
1.2 deraadt 61: <a name=xlockmore></a>
62: <li><font color=#009000><strong>022: SECURITY FIX: May 25, 2000</strong></font><br>
63: xlockmore has a localhost attack against it which allows recovery of the encrypted
64: hash of the root password. The damage to systems using DES passwords from this
65: attack is pretty heavy, but to systems with a well-chosen root password under
66: blowfish encoding
67: (see <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&sektion=3">
68: crypt(3)</a>)
69: the impact is much reduced.<br>
70: (Aside: We do not consider this a localhost root hole in the default install,
71: since we have not seen a fast blowfish cracker yet ;-)<br>
1.3 deraadt 72: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/022_xlockmore.patch>
1.6 deraadt 73: A source code patch exists, which remedies this problem. This is the 2nd patch designed to solve this problem.</a>
1.2 deraadt 74: <p>
1.1 deraadt 75: <a name=rzsz></a>
76: <li><font color=#009000><strong>021: RZSZ SNOOPING: Jan 31, 2000</strong></font><br>
77: The rzsz port was removed from the ports collection, as it collects and
78: sends user information to a designated email address, effectively spying on
79: you. <em>It is recommended that you remove this package if you installed
80: it</em>.
81: <p>
82: <a name=syslog></a>
83: <li><font color=#009000><strong>020: LIBRARY IMPROVEMENT: Jan 26, 2000</strong></font><br>
84: syslog(3) would not try to reopen the socket, thus, nightly newsyslog(8)
85: would cause syslogd(8) to not see new messages.
86: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/020_syslog.patch>
87: A source code patch exists, which remedies this problem.</a>
88: <p>
89: <a name=nsphy></a>
90: <li><font color=#009000><strong>019: DRIVER IMPROVEMENT: Jan 20, 2000</strong></font><br>
91: Intel fxp cards with National Semiconductor PHYs (nsphy) have trouble
92: negotiating and maintaining 100Mb link integrity.<br>
93: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/019_nsphy.patch>
94: A source code patch exists, which remedies this problem.</a>
95: <p>
96: <a name=procfs></a>
97: <li><font color=#009000><strong>018: SECURITY FIX: Jan 20, 2000</strong></font><br>
98: Systems running with procfs enabled and mounted are vulnerable
99: to having the stderr output of setuid processes directed onto
100: a pre-seeked descriptor onto the stack in their own procfs memory.<br>
101: Note that procfs is not mounted by default in OpenBSD.<br>
102: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/018_procfs.patch>
103: A source code patch exists, which remedies this problem.</a>
104: <p>
105: <a name=aty2k></a>
106: <li><font color=#009000><strong>015: Y2K FIX: Jan 9, 2000</strong></font><br>
107: The at(1) command was unable to parse some kinds of dates.<br>
108: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/015_aty2k.patch>
109: A source code patch exists, which remedies this problem.</a>
110: <p>
111: <a name=addusery2k></a>
112: <li><font color=#009000><strong>013: Y2K FIX: Jan 3, 2000</strong></font><br>
113: A minor problem in the logging support for the adduser(8) command.<br>
114: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/013_addusery2k.patch>
115: A source code patch exists, which remedies this problem.</a>
116: <p>
117: <a name=3c900b></a>
118: <li><font color=#009000><strong>012: DRIVER IMPROVEMENT: Jan 3, 2000</strong></font><br>
119: The 3C900B-TPO fails to select the correct media type (it never sees or
120: sends packets).<br>
121: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_3c900b.patch>
122: A source code patch exists, which remedies this problem.</a>
123: <p>
124: <a name=poll></a>
125: <li><font color=#009000><strong>011: SECURITY FIX: Dec 4, 1999</strong></font><br>
126: Various bugs in poll(2) may cause a kernel crash.<br>
127: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/011_poll.patch>
128: A source code patch exists, which remedies this problem.</a>
129: <p>
130: <a name=sendmail></a>
131: <li><font color=#009000><strong>010: SECURITY FIX: Dec 4, 1999</strong></font><br>
132: Sendmail had a race in aliases file handling, which this patch fixes.<br>
133: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/010_sendmail.patch>
134: A source code patch exists, which remedies this problem.</a>
135: <p>
136: <a name=atapijumbo></a>
137: <li><font color=#009000><strong>009: DRIVER IMPROVEMENTS: Dec 4, 1999</strong></font><br>
138: Various improvements have been made to the IDE/ATAPI subsystem since
139: the 2.6 release shipped.<br>
140: Some of these improvements make some recalcitrant devices work much better.
141: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/009_atapi.patch><br>
142: Revision 1 of this jumbo source code patch exists.</a><br>
143: <p>
144: <a name=sslUSA></a>
145: <li><font color=#009000><strong>016: SECURITY FIX: Dec 2, 1999</strong></font><br>
146: A buffer overflow in the RSAREF code included in the
147: USA version of the libssl package (called <strong>sslUSA</strong>, is
148: possibly exploitable in isakmpd if SSL/RSA features
149: are enabled or used.<br>
150: <a href=http://www.openssh.com>OpenSSH</a> and httpd (with -DSSL) are not
151: vulnerable.<br>
152: <strong>NOTE: International users using the ssl26 package are not affected.</strong>
153: <p>
154: To check what package you are using, use
155: <pre>
156: <b>#</b> pkg_info sslUSA26
157: </pre>
158: The patched library says:<br>
159: "ssl26.1 USA-only non-commercial crypto libs incl. SSL & RSA"
160: <p>
161: Non-commercial USA users who installed the ssl package before December 3
162: should upgrade their <strong>sslUSA26</strong> package using:<br>
163: <pre>
164: <b>#</b> pkg_delete sslUSA26
165: <b>#</b> pkg_add -v sslUSA26.tar.gz
166: </pre>
167: Using the new <strong>sslUSA26.tar.gz</strong> files which have been placed
168: on the FTP mirrors.<br>
169: <a href=advisories/sslUSA>For more information, see the advisory</a>.<br>
170: <strong>NOTE: this problem turned out to not be unexploitable in OpenSSH.</strong>
171: <p>
172: <a name=fortran></a>
173: <li><font color=#009000><strong>017: FUNCTIONALITY ADDITION: Nov 14, 1999</strong></font><br>
174: Fortran doesn't work right. The file /usr/include/g2c.h is missing in the
175: release.<br>
176: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/008_fortran.patch>
177: A source code patch exists which remedies this problem.</a><br>
178: The patch fixes the source tree and describes how to properly add
179: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/g2c.h>
180: the include file</a> to your system.
181: <p>
182: <a name=sshjumbo></a>
183: <li><font color=#009000><strong>005: FUNCTIONALITY ADDITION: Nov 11, 1999</strong></font><br>
184: Various OpenSSH improvements have been made since the 2.6 release shipped.<br>
185: To resolve the various (non-security related) features which users may want,
186: we are making a jumbo patch available. <strong>This is now at VERSION FOUR.</strong><br>
187: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/005_sshjumbo.patch>
188: Revision 4 of this jumbo source code patch exists.</a><br>
189: <strong>NOTE: /etc/sshd_config and /etc/ssh_config may need changes.</strong>
190: <p>
191: <a name=m4></a>
192: <li><font color=#009000><strong>003: FUNCTIONALITY FIX: Nov 10, 1999</strong></font><br>
193: m4 is quite broken in the 2.6 release.<br>
194: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/003_m4.patch>
195: The 3rd version of the source code patch exists, which remedies this problem.</a>
196: <p>
197: <a name=ifmedia></a>
198: <li><font color=#009000><strong>002: SECURITY FIX: Nov 9, 1999</strong></font><br>
199: Any user can change interface media configurations.<br>
200: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/002_ifmedia.patch>
201: A source code patch exists which remedies this problem.</a>
202: <p>
203: <a name=newsyslog></a>
204: <li><font color=#009000><strong>001: RELIABILITY FIX: Nov 8, 1999</strong></font><br>
205: A race condition in newsyslog(8) can cause errors in log file rotation.<br>
206: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/001_newsyslog.patch>
207: A source code patch exists which remedies this problem.</a>
208: <p>
209: </ul>
210: <p>
211: <a name=i386></a>
212: <li><h3><font color=#e00000>i386</font></h3>
213: <ul>
214: <li>No problems identified yet.
215: </ul>
216: <p>
217: <a name=mac68k></a>
218: <li><h3><font color=#e00000>mac68k</font></h3>
219: <ul>
220: <a name=m68k_locore></a>
221: <a name=mac68k_locore></a>
222: <li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br>
223: All m68k kernels can possibly be crashed by a user.<br>
224: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch>
225: A source code patch exists which remedies this problem.</a>
226: <p>
227: </ul>
228: <p>
229: <a name=sparc></a>
230: <li><h3><font color=#e00000>sparc</font></h3>
231: <ul>
232: <a name=eepromy2k></a>
233: <li><font color=#009000><strong>014: Y2K FIX: Jan 3, 2000</strong></font><br>
234: A minor problem; the sparc eeprom(8) command is not Y2K compliant.<br>
235: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/014_eepromy2k.patch>
236: Revision 2 of the source code patch exists, which remedies this problem.</a>
237: <p>
238: <a name=sparc_locore></a>
239: <li><font color=#009000><strong>004: RELIABILITY FIX: Nov 12, 1999</strong></font><br>
240: The sparc kernel can be crashed by a user.<br>
241: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/004_locore.patch>
242: A source code patch exists which remedies this problem.</a>
243: <p>
244: </ul>
245: <p>
246: <a name=amiga></a>
247: <li><h3><font color=#e00000>amiga</font></h3>
248: <ul>
249: <a name=amiga_locore></a>
250: <li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br>
251: All m68k kernels can possibly be crashed by a user.<br>
252: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch>
253: A source code patch exists which remedies this problem.</a>
254: <p>
255: </ul>
256: <p>
257: <a name=pmax></a>
258: <li><h3><font color=#e00000>pmax</font></h3>
259: <ul>
260: <li>No problems identified yet.
261: </ul>
262: <p>
263: <a name=arc></a>
264: <li><h3><font color=#e00000>arc</font></h3>
265: <ul>
266: <li>No problems identified yet.
267: </ul>
268: <p>
269: <a name=alpha></a>
270: <li><h3><font color=#e00000>alpha</font></h3>
271: <ul>
272: <a name=alpha_locore></a>
273: <li><font color=#009000><strong>006: RELIABILITY FIX: Nov 13, 1999</strong></font><br>
274: The alpha kernel can possibly be crashed by a user.<br>
275: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/alpha/006_locore.patch>
276: A source code patch exists which remedies this problem.</a>
277: <p>
278: </ul>
279: <p>
280: <a name=hp300></a>
281: <li><h3><font color=#e00000>hp300</font></h3>
282: <ul>
283: <a name=hp300_locore></a>
284: <li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br>
285: All m68k kernels can possibly be crashed by a user.<br>
286: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch>
287: A source code patch exists which remedies this problem.</a>
288: <p>
289: </ul>
290: <p>
291: <a name=mvme68k></a>
292: <li><h3><font color=#e00000>mvme68k</font></h3>
293: <ul>
294: <a name=mvme68k_locore></a>
295: <li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br>
296: All m68k kernels can possibly be crashed by a user.<br>
297: <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch>
298: A source code patch exists which remedies this problem.</a>
299: <p>
300: </ul>
301: <p>
302: <a name=powerpc></a>
303: <li><h3><font color=#e00000>powerpc</font></h3>
304: <ul>
305: <li>No problems identified yet.
306: </ul>
307:
308: </dl>
309: <br>
310:
311: <hr>
312: <a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
313: <a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
314: <a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
315: <a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
316: <a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
317: <a href=errata.html>For 2.7 errata, please refer here</a>.<br>
318: <hr>
319:
320: <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>
321: <a href=mailto:www@openbsd.org>www@openbsd.org</a>
1.7 ! deraadt 322: <br><small>$OpenBSD: errata26.html,v 1.6 2000/05/26 17:58:56 deraadt Exp $</small>
1.1 deraadt 323:
324: </body>
325: </html>