version 1.66, 2014/03/31 03:12:47 |
version 1.67, 2014/03/31 03:36:54 |
|
|
|
|
<hr> |
<hr> |
|
|
<a name="all"></a> |
|
<h3><font color="#e00000">All architectures</font></h3> |
|
<ul> |
<ul> |
<li><a name="readline"></a> |
<li><a name="readline"></a> |
<font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br> |
<font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font> <i>All architectures</i><br> |
The readline library shipped with OpenBSD allows history files creation |
The readline library shipped with OpenBSD allows history files creation |
with a permissive |
with a permissive |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="sudo"></a> |
<li><a name="sudo"></a> |
<font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br> |
<font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font> <i>All architectures</i><br> |
There is an exploitable heap corruption bug in |
There is an exploitable heap corruption bug in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ftpd"></a> |
<li><a name="ftpd"></a> |
<font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br> |
<font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font> <i>All architectures</i><br> |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="sshforwarding"> </a> |
<li><a name="sshforwarding"> </a> |
<font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br> |
<font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font> <i>All architectures</i><br> |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
This problem is fixed as of OpenSSH 2.3.0.<br> |
This problem is fixed as of OpenSSH 2.3.0.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="execsubr"> </a> |
<li><a name="execsubr"> </a> |
<font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br> |
<font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font> <i>All architectures</i><br> |
Invalid fields in the exec header could cause a crash.<br> |
Invalid fields in the exec header could cause a crash.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="xtrans"> </a> |
<li><a name="xtrans"> </a> |
<font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br> |
<font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font> <i>All architectures</i><br> |
There are two possibly exploitable potential buffer overflows in the X11 |
There are two possibly exploitable potential buffer overflows in the X11 |
libraries using the xtrans code. One of these vulnerabilities was |
libraries using the xtrans code. One of these vulnerabilities was |
reported to the |
reported to the |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="httpd"></a> |
<li><a name="httpd"></a> |
<font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br> |
<font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font> <i>All architectures</i><br> |
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> |
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> |
that could cause arbitrary files accessible to the www user on the server |
that could cause arbitrary files accessible to the www user on the server |
to be exposed under certain configurations when these modules are used. |
to be exposed under certain configurations when these modules are used. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="telnetd"></a> |
<li><a name="telnetd"></a> |
<font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br> |
<font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font> <i>All architectures</i><br> |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
and TERMCAP (when it starts with a '/') environment variables. |
and TERMCAP (when it starts with a '/') environment variables. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="sendmail"></a> |
<li><a name="sendmail"></a> |
<font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br> |
<font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font> <i>All architectures</i><br> |
There is a non-exploitable buffer overflow in sendmail's test mode. |
There is a non-exploitable buffer overflow in sendmail's test mode. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="format_strings"></a> |
<li><a name="format_strings"></a> |
<font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font> <i>All architectures</i><br> |
There are printf-style format string bugs in several privileged programs. |
There are printf-style format string bugs in several privileged programs. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="curses"></a> |
<li><a name="curses"></a> |
<font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font> <i>All architectures</i><br> |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
as well as in the TERMCAP environment variable for setuid and setgid |
as well as in the TERMCAP environment variable for setuid and setgid |
applications. |
applications. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="talkd"></a> |
<li><a name="talkd"></a> |
<font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font> <i>All architectures</i><br> |
A format string vulnerability exists in talkd(8). It is not clear |
A format string vulnerability exists in talkd(8). It is not clear |
yet what the impact is. |
yet what the impact is. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="pw_error"></a> |
<li><a name="pw_error"></a> |
<font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br> |
<font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font> <i>All architectures</i><br> |
A format string vulnerability exists in the pw_error(3) function. This |
A format string vulnerability exists in the pw_error(3) function. This |
manifests itself as a security hole in the chpass utility. As a workaround |
manifests itself as a security hole in the chpass utility. As a workaround |
which disables its functionality, do |
which disables its functionality, do |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ipsec"></a> |
<li><a name="ipsec"></a> |
<font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br> |
<font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font> <i>All architectures</i><br> |
Bad ESP/AH packets could cause a crash under certain conditions. |
Bad ESP/AH packets could cause a crash under certain conditions. |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="xlock"></a> |
<li><a name="xlock"></a> |
<font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br> |
<font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font> <i>All architectures</i><br> |
A format string vulnerability exists in xlock. As a workaround which disables |
A format string vulnerability exists in xlock. As a workaround which disables |
its functionality, do |
its functionality, do |
<pre> |
<pre> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="X11_libs"></a> |
<li><a name="X11_libs"></a> |
<font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font><br> |
<font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font> <i>All architectures</i><br> |
Various problems in X11 libraries have various side effects. We provide a |
Various problems in X11 libraries have various side effects. We provide a |
jumbo patch to fix them.<p> |
jumbo patch to fix them.<p> |
<ul> |
<ul> |
|
|
time /etc/weekly runs. |
time /etc/weekly runs. |
<p> |
<p> |
<li><a name="ftpd"></a> |
<li><a name="ftpd"></a> |
<font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font><br> |
<font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font> <i>All architectures</i><br> |
Just like pretty much all the other unix ftp daemons on the planet, |
Just like pretty much all the other unix ftp daemons on the planet, |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
The problem exists if anonymous ftp is enabled. |
The problem exists if anonymous ftp is enabled. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="mopd"></a> |
<li><a name="mopd"></a> |
<font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font><br> |
<font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font> <i>All architectures</i><br> |
Mopd contained a buffer overflow. |
Mopd contained a buffer overflow. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="screen"></a> |
<li><a name="screen"></a> |
<font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font> |
<font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font> <i>All architectures</i><br> |
<br> |
|
The screen package shipped with 2.7 does not install itself properly. The |
The screen package shipped with 2.7 does not install itself properly. The |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="libedit"></a> |
<li><a name="libedit"></a> |
<font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font><br> |
<font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font> <i>All architectures</i><br> |
libedit would check for a <b>.editrc</b> file in the current directory. |
libedit would check for a <b>.editrc</b> file in the current directory. |
That behaviour is not nice; this does not turn into a security problem in |
That behaviour is not nice; this does not turn into a security problem in |
any real world situation that we know of, but a patch is available anyways. |
any real world situation that we know of, but a patch is available anyways. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="dhclient"></a> |
<li><a name="dhclient"></a> |
<font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font><br> |
<font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font> <i>All architectures</i><br> |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
server to be executed in the shell as root. |
server to be executed in the shell as root. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="isakmpd"></a> |
<li><a name="isakmpd"></a> |
<font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font><br> |
<font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font> <i>All architectures</i><br> |
A serious bug in isakmpd(8) policy handling wherein policy |
A serious bug in isakmpd(8) policy handling wherein policy |
verification could be completely bypassed in isakmpd. |
verification could be completely bypassed in isakmpd. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="msdosfs"></a> |
<li><a name="msdosfs"></a> |
<font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br> |
<font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font> <i>All architectures</i><br> |
Some operations in msdosfs could result in a system panic. |
Some operations in msdosfs could result in a system panic. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="cd9660"></a> |
<li><a name="cd9660"></a> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font> <i>All architectures</i><br> |
NFS exporting of CD filesystems caused a system panic. |
NFS exporting of CD filesystems caused a system panic. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="uselogin"></a> |
<li><a name="uselogin"></a> |
<font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font><br> |
<font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font> <i>All architectures</i><br> |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
be used. On other operating systems, it results in a hole.<br> |
be used. On other operating systems, it results in a hole.<br> |
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
<p> |
<p> |
<li><a name="ipopts"></a> |
<li><a name="ipopts"></a> |
<font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br> |
<font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font> <i>All architectures</i><br> |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
to crash the machine remote or locally. |
to crash the machine remote or locally. |
<br> |
<br> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="route"></a> |
<li><a name="route"></a> |
<font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br> |
<font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font> <i>All architectures</i><br> |
Certain routing table modifications by the superuser could cause a system panic. |
Certain routing table modifications by the superuser could cause a system panic. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="bridge"></a> |
<li><a name="bridge"></a> |
<font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font><br> |
<font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font> <i>All architectures</i><br> |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
go directly to the machine acting as a |
go directly to the machine acting as a |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ef"></a> |
<li><a name="ef"></a> |
<font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font><br> |
<font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font> <i>All architectures</i><br> |
The |
The |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a> |
driver will complain when adding an address with ifconfig |
driver will complain when adding an address with ifconfig |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li><a name="ipf"></a> |
<li><a name="ipf"></a> |
<font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font><br> |
<font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font> <i>All architectures</i><br> |
A misuse of ipf(8) |
A misuse of ipf(8) |
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch"> |