version 1.95, 2019/05/27 22:55:19 |
version 1.96, 2019/05/28 16:32:41 |
|
|
<hr> |
<hr> |
|
|
<ul> |
<ul> |
<li id="readline"> |
|
<strong>040: SECURITY FIX: Mar 18, 2001</strong> |
<li id="ipf"> |
|
<strong>001: SECURITY FIX: May 25, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The readline library shipped with OpenBSD allows history files creation |
A misuse of ipf(8) |
with a permissive |
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
<a href="https://man.openbsd.org/OpenBSD-2.7/umask.2">umask(2)</a>. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch"> |
This can lead to the leakage of sensitive information in applications |
|
that use passwords and the like during user interaction (one such |
|
application is mysql). Additionally, if the HOME environment variable |
|
is not set, the current working directory is used; this patch disables |
|
the history file if HOME is not set.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
It updates ipf to version 3.3.16. |
<p> |
<p> |
<li id="sudo"> |
|
<strong>039: SECURITY FIX: Feb 22, 2001</strong> |
<li id="ef"> |
|
<strong>002: DRIVER FIX: May 26, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
There is an exploitable heap corruption bug in |
The |
<a href="https://man.openbsd.org/OpenBSD-2.7/sudo.8">sudo</a>. |
<a href="https://man.openbsd.org/OpenBSD-2.7/ef.4">ef(4)</a> |
<br> |
driver will complain when adding an address with ifconfig |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch"> |
(ifconfig: SIOCAIFADDR: Invalid argument).<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ftpd"> |
|
<strong>037: SECURITY FIX: Dec 4, 2000</strong> |
<li id="bridge"> |
|
<strong>003: SECURITY FIX: May 26, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
go directly to the machine acting as a |
|
<a href="https://man.openbsd.org/OpenBSD-2.7/bridge.4">bridge</a>. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="qe"> |
|
<strong>036: RELIABILITY FIX: Nov 17, 2000</strong><br> |
<li id="route"> |
Configuring a qec+qe causes a NMI panic.<br> |
<strong>004: RELIABILITY FIX: May 29, 2000</strong> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch"> |
<i>All architectures</i><br> |
|
Certain routing table modifications by the superuser could cause a system panic. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="sshforwarding"> |
|
<strong>035: SECURITY FIX: Nov 10, 2000</strong> |
<li id="ipopts"> |
|
<strong>005: RELIABILITY FIX: May 29, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
This problem is fixed as of OpenSSH 2.3.0.<br> |
to crash the machine remote or locally. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch"> |
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="zsconsole"> |
|
<strong>034: RELIABILITY FIX: Nov 10, 2000</strong><br> |
<li id="uselogin"> |
When running a sparc with a serial console, certain types of interrupts would |
<strong>006: SECURITY FIX: June 6, 2000</strong> |
cause great grief.<br> |
<i>All architectures</i><br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch"> |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
A source code patch exists which remedies this problem.</a> |
be used. On other operating systems, it results in a hole.<br> |
|
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
<p> |
<p> |
<li id="execsubr"> |
|
<strong>033: RELIABILITY FIX: Nov 6, 2000</strong> |
<li id="cd9660"> |
|
<strong>007: RELIABILITY FIX: June 8, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Invalid fields in the exec header could cause a crash.<br> |
NFS exporting of CD filesystems caused a system panic. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch"> |
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="xtrans"> |
|
<strong>032: SECURITY FIX: Oct 26, 2000</strong> |
<li id="msdosfs"> |
|
<strong>008: RELIABILITY FIX: June 8, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
There are two possibly exploitable potential buffer overflows in the X11 |
Some operations in msdosfs could result in a system panic. |
libraries using the xtrans code. One of these vulnerabilities was |
|
reported to the |
|
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a> |
|
mailing list. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="httpd"> |
|
<strong>031: SECURITY FIX: Oct 18, 2000</strong> |
<li id="isakmpd"> |
|
<strong>009: SECURITY FIX: June 9, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Apache has several bugs in <code>mod_rewrite</code> and <code>mod_vhost_alias</code> |
A serious bug in isakmpd(8) policy handling wherein policy |
that could cause arbitrary files accessible to the www user on the server |
verification could be completely bypassed in isakmpd. |
to be exposed under certain configurations when these modules are used. |
|
(These modules are not active by default). |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="telnetd"> |
|
<strong>030: SECURITY FIX: Oct 10, 2000</strong> |
<li id="amiga_cd"> |
<i>All architectures</i><br> |
<strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong><br> |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives |
and TERMCAP (when it starts with a '/') environment variables. |
files for installation, ie: |
|
<pre> |
|
-rw-r--r-- 1 root mirftp 20191465 Apr 29 14:27 base27.tar.gz |
|
-rw-r--r-- 1 root mirftp 20291753 May 13 19:33 base27.tgz |
|
-rw-r--r-- 1 root mirftp 13699507 Apr 29 14:26 comp27.tar.gz |
|
-rw-r--r-- 1 root mirftp 13748096 May 13 19:33 comp27.tgz |
|
-rw-r--r-- 1 root mirftp 1005376 Apr 29 14:26 etc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1010772 May 13 19:33 etc27.tgz |
|
-rw-r--r-- 1 root mirftp 2755567 Apr 29 14:26 game27.tar.gz |
|
-rw-r--r-- 1 root mirftp 2755624 May 13 19:33 game27.tgz |
|
-rw-r--r-- 1 root mirftp 5002872 Apr 29 14:26 man27.tar.gz |
|
-rw-r--r-- 1 root mirftp 5038896 May 13 19:33 man27.tgz |
|
-rw-r--r-- 1 root mirftp 1684356 Apr 29 14:26 misc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1684381 May 13 19:33 misc27.tgz |
|
</pre> |
|
The installation script will list ALL of these files. For proper |
|
operation one should install the <b>*.tgz</b> versions, and deselect |
|
the <b>*.tar.gz</b> versions.<br> |
|
The FTP area sets do not suffer from this problem. |
|
<p> |
|
|
|
<li id="if_an"> |
|
<strong>011: DRIVER BUG: June 17, 2000</strong><br> |
|
The <a href="https://man.openbsd.org/OpenBSD-2.7/an.4">an(4)</a> |
|
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents |
|
<a href="https://man.openbsd.org/OpenBSD-2.7/ancontrol.8">ancontrol(8)</a> from working correctly, instead causing a panic. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="sendmail"> |
|
<strong>029: RELIABILITY FIX: Oct 9, 2000</strong> |
<li id="dhclient"> |
|
<strong>012: SECURITY FIX: June 24, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
There is a non-exploitable buffer overflow in sendmail's test mode. |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
|
server to be executed in the shell as root. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="format_strings"> |
|
<strong>028: SECURITY FIX: Oct 6, 2000</strong> |
<li id="libedit"> |
|
<strong>013: SECURITY FIX: June 28, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
There are printf-style format string bugs in several privileged programs. |
libedit would check for a <b>.editrc</b> file in the current directory. |
|
That behaviour is not nice; this does not turn into a security problem in |
|
any real world situation that we know of, but a patch is available anyways. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="curses"> |
|
<strong>027: SECURITY FIX: Oct 6, 2000</strong> |
<li id="pcvt"> |
<i>All architectures</i><br> |
<strong>014: DRIVER BUG: June 30, 2000</strong><br> |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
The PC console driver (PCVT) has two bugs. Display problems can result if |
as well as in the TERMCAP environment variable for setuid and setgid |
reverse video mode is turned on or off twice in a row. This patch also |
applications. |
fixes a problem with scrolling region handling that has been seen by many |
|
users trying to use the BitchX irc client with the screen program.<br> |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
|
This is the second revision of the patch. |
<p> |
<p> |
<li id="talkd"> |
|
<strong>026: SECURITY FIX: Oct 6, 2000</strong> |
<li id="ste"> |
<i>All architectures</i><br> |
<strong>015: DRIVER BUG: June 30, 2000</strong><br> |
A format string vulnerability exists in talkd(8). It is not clear |
The <a href="https://man.openbsd.org/OpenBSD-2.7/ste.4">ste(4)</a> |
yet what the impact is. |
driver supporting Ethernet cards based on the Sundance ST201 chipset |
|
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at |
|
boot-time. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="pw_error"> |
|
<strong>025: SECURITY FIX: Oct 3, 2000</strong> |
<li id="xlhash"> |
|
<strong>016: DRIVER BUG: July 2, 2000</strong><br> |
|
The <a href="https://man.openbsd.org/OpenBSD-2.7/xl.4">xl(4)</a> |
|
driver supporting various 3com cards, had a bug which prevented the multicast |
|
filter from working correctly on the 3c905B, thus preventing many IPv6 things |
|
from working. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="screen"> |
|
<strong>017: INSTALLATION FIX: July 3, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A format string vulnerability exists in the pw_error(3) function. This |
The screen package shipped with 2.7 does not install itself properly. The |
manifests itself as a security hole in the chpass utility. As a workaround |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
which disables its functionality, do |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
<pre> |
name screen-3.9.5p1.tgz. |
# chmod u-s /usr/bin/chpass |
<br> |
</pre> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ipsec"> |
|
<strong>024: SECURITY FIX: Sep 18, 2000</strong> |
<li id="mopd"> |
|
<strong>018: SECURITY FIX: July 5, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Bad ESP/AH packets could cause a crash under certain conditions. |
Mopd contained a buffer overflow. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br> |
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="xlock"> |
|
<strong>023: SECURITY FIX: Aug 16, 2000</strong> |
<li id="ftpd2"> |
|
<strong>019: SECURITY FIX: July 5, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A format string vulnerability exists in xlock. As a workaround which disables |
Just like pretty much all the other unix ftp daemons on the planet, |
its functionality, do |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
<pre> |
The problem exists if anonymous ftp is enabled. |
# chmod u-s /usr/X11R6/bin/xlock |
<br> |
</pre> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="mac68k_arandom"> |
|
<strong>022: INSTALLATION FIX: July 14, 2000</strong> |
<li id="pmax_msgbuf"> |
|
<strong>020: KERNEL BUG: July 10, 2000</strong><br> |
|
As originally shipped, the pmax port would fail to install due to |
|
<b>/kern/msgbuf</b> bugs.<br> |
|
The necessary fixes have been merged, |
|
and the binaries needed re-released on the FTP site.<br> |
|
However, the 2.7 <b>srcsys.tar.gz</b> file has not been updated.<br> |
|
If you recompile a kernel, you should use either the |
|
<a href=stable.html>stable release source tree</a> or apply the |
|
provided patch to a 2.7 source tree. |
<br> |
<br> |
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch"> |
devices, specifically it does not make the <code>/dev/arandom</code> device |
A source code patch exists which remedies this problem.</a> |
needed for the userland crypto such as ssh to work. The problem shows itself |
|
when ssh-keygen fails to make RSA or DSA keys, resulting in messages like |
|
<b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>. |
|
<br> |
|
To work around this, once your machine is up and running run the following |
|
commands as root: |
|
<pre> |
|
# cd /dev |
|
# ./MAKEDEV arandom |
|
</pre> |
|
<p> |
<p> |
After doing this (and possibly installing one of the ssl27 packages), |
|
reboot your machine and it will generate ssh keys correctly. |
|
<p> |
|
<li id="X11_libs"> |
<li id="X11_libs"> |
<strong>021: SECURITY FIX: July 14, 2000</strong> |
<strong>021: SECURITY FIX: July 14, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
|
|
ignore the build error. The whatis database will be rebuilt the next |
ignore the build error. The whatis database will be rebuilt the next |
time /etc/weekly runs. |
time /etc/weekly runs. |
<p> |
<p> |
<li id="pmax_msgbuf"> |
|
<strong>020: KERNEL BUG: July 10, 2000</strong><br> |
<li id="mac68k_arandom"> |
As originally shipped, the pmax port would fail to install due to |
<strong>022: INSTALLATION FIX: July 14, 2000</strong> |
<b>/kern/msgbuf</b> bugs.<br> |
|
The necessary fixes have been merged, |
|
and the binaries needed re-released on the FTP site.<br> |
|
However, the 2.7 <b>srcsys.tar.gz</b> file has not been updated.<br> |
|
If you recompile a kernel, you should use either the |
|
<a href=stable.html>stable release source tree</a> or apply the |
|
provided patch to a 2.7 source tree. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch"> |
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all |
A source code patch exists which remedies this problem.</a> |
devices, specifically it does not make the <code>/dev/arandom</code> device |
|
needed for the userland crypto such as ssh to work. The problem shows itself |
|
when ssh-keygen fails to make RSA or DSA keys, resulting in messages like |
|
<b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>. |
|
<br> |
|
To work around this, once your machine is up and running run the following |
|
commands as root: |
|
<pre> |
|
# cd /dev |
|
# ./MAKEDEV arandom |
|
</pre> |
<p> |
<p> |
<li id="ftpd2"> |
After doing this (and possibly installing one of the ssl27 packages), |
<strong>019: SECURITY FIX: July 5, 2000</strong> |
reboot your machine and it will generate ssh keys correctly. |
|
<p> |
|
|
|
<li id="xlock"> |
|
<strong>023: SECURITY FIX: Aug 16, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Just like pretty much all the other unix ftp daemons on the planet, |
A format string vulnerability exists in xlock. As a workaround which disables |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
its functionality, do |
The problem exists if anonymous ftp is enabled. |
<pre> |
<br> |
# chmod u-s /usr/X11R6/bin/xlock |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch"> |
</pre> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="mopd"> |
|
<strong>018: SECURITY FIX: July 5, 2000</strong> |
<li id="ipsec"> |
|
<strong>024: SECURITY FIX: Sep 18, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Mopd contained a buffer overflow. |
Bad ESP/AH packets could cause a crash under certain conditions. |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="screen"> |
|
<strong>017: INSTALLATION FIX: July 3, 2000</strong> |
<li id="pw_error"> |
|
<strong>025: SECURITY FIX: Oct 3, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The screen package shipped with 2.7 does not install itself properly. The |
A format string vulnerability exists in the pw_error(3) function. This |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
manifests itself as a security hole in the chpass utility. As a workaround |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
which disables its functionality, do |
name screen-3.9.5p1.tgz. |
<pre> |
<br> |
# chmod u-s /usr/bin/chpass |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch"> |
</pre> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="xlhash"> |
|
<strong>016: DRIVER BUG: July 2, 2000</strong><br> |
<li id="talkd"> |
The <a href="https://man.openbsd.org/OpenBSD-2.7/xl.4">xl(4)</a> |
<strong>026: SECURITY FIX: Oct 6, 2000</strong> |
driver supporting various 3com cards, had a bug which prevented the multicast |
<i>All architectures</i><br> |
filter from working correctly on the 3c905B, thus preventing many IPv6 things |
A format string vulnerability exists in talkd(8). It is not clear |
from working. |
yet what the impact is. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ste"> |
|
<strong>015: DRIVER BUG: June 30, 2000</strong><br> |
<li id="curses"> |
The <a href="https://man.openbsd.org/OpenBSD-2.7/ste.4">ste(4)</a> |
<strong>027: SECURITY FIX: Oct 6, 2000</strong> |
driver supporting Ethernet cards based on the Sundance ST201 chipset |
<i>All architectures</i><br> |
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
boot-time. |
as well as in the TERMCAP environment variable for setuid and setgid |
|
applications. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="pcvt"> |
|
<strong>014: DRIVER BUG: June 30, 2000</strong><br> |
<li id="format_strings"> |
The PC console driver (PCVT) has two bugs. Display problems can result if |
<strong>028: SECURITY FIX: Oct 6, 2000</strong> |
reverse video mode is turned on or off twice in a row. This patch also |
<i>All architectures</i><br> |
fixes a problem with scrolling region handling that has been seen by many |
There are printf-style format string bugs in several privileged programs. |
users trying to use the BitchX irc client with the screen program.<br> |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
This is the second revision of the patch. |
|
<p> |
<p> |
<li id="libedit"> |
|
<strong>013: SECURITY FIX: June 28, 2000</strong> |
<li id="sendmail"> |
|
<strong>029: RELIABILITY FIX: Oct 9, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
libedit would check for a <b>.editrc</b> file in the current directory. |
There is a non-exploitable buffer overflow in sendmail's test mode. |
That behaviour is not nice; this does not turn into a security problem in |
|
any real world situation that we know of, but a patch is available anyways. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="dhclient"> |
|
<strong>012: SECURITY FIX: June 24, 2000</strong> |
<li id="telnetd"> |
|
<strong>030: SECURITY FIX: Oct 10, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
server to be executed in the shell as root. |
and TERMCAP (when it starts with a '/') environment variables. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="if_an"> |
|
<strong>011: DRIVER BUG: June 17, 2000</strong><br> |
<li id="httpd"> |
The <a href="https://man.openbsd.org/OpenBSD-2.7/an.4">an(4)</a> |
<strong>031: SECURITY FIX: Oct 18, 2000</strong> |
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents |
<i>All architectures</i><br> |
<a href="https://man.openbsd.org/OpenBSD-2.7/ancontrol.8">ancontrol(8)</a> from working correctly, instead causing a panic. |
Apache has several bugs in <code>mod_rewrite</code> and <code>mod_vhost_alias</code> |
|
that could cause arbitrary files accessible to the www user on the server |
|
to be exposed under certain configurations when these modules are used. |
|
(These modules are not active by default). |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="amiga_cd"> |
|
<strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong><br> |
<li id="xtrans"> |
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives |
<strong>032: SECURITY FIX: Oct 26, 2000</strong> |
files for installation, ie: |
|
<pre> |
|
-rw-r--r-- 1 root mirftp 20191465 Apr 29 14:27 base27.tar.gz |
|
-rw-r--r-- 1 root mirftp 20291753 May 13 19:33 base27.tgz |
|
-rw-r--r-- 1 root mirftp 13699507 Apr 29 14:26 comp27.tar.gz |
|
-rw-r--r-- 1 root mirftp 13748096 May 13 19:33 comp27.tgz |
|
-rw-r--r-- 1 root mirftp 1005376 Apr 29 14:26 etc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1010772 May 13 19:33 etc27.tgz |
|
-rw-r--r-- 1 root mirftp 2755567 Apr 29 14:26 game27.tar.gz |
|
-rw-r--r-- 1 root mirftp 2755624 May 13 19:33 game27.tgz |
|
-rw-r--r-- 1 root mirftp 5002872 Apr 29 14:26 man27.tar.gz |
|
-rw-r--r-- 1 root mirftp 5038896 May 13 19:33 man27.tgz |
|
-rw-r--r-- 1 root mirftp 1684356 Apr 29 14:26 misc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1684381 May 13 19:33 misc27.tgz |
|
</pre> |
|
The installation script will list ALL of these files. For proper |
|
operation one should install the <b>*.tgz</b> versions, and deselect |
|
the <b>*.tar.gz</b> versions.<br> |
|
The FTP area sets do not suffer from this problem. |
|
<p> |
|
<li id="isakmpd"> |
|
<strong>009: SECURITY FIX: June 9, 2000</strong> |
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A serious bug in isakmpd(8) policy handling wherein policy |
There are two possibly exploitable potential buffer overflows in the X11 |
verification could be completely bypassed in isakmpd. |
libraries using the xtrans code. One of these vulnerabilities was |
|
reported to the |
|
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a> |
|
mailing list. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="msdosfs"> |
|
<strong>008: RELIABILITY FIX: June 8, 2000</strong> |
<li id="execsubr"> |
|
<strong>033: RELIABILITY FIX: Nov 6, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Some operations in msdosfs could result in a system panic. |
Invalid fields in the exec header could cause a crash.<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="cd9660"> |
|
<strong>007: RELIABILITY FIX: June 8, 2000</strong> |
<li id="zsconsole"> |
<i>All architectures</i><br> |
<strong>034: RELIABILITY FIX: Nov 10, 2000</strong><br> |
NFS exporting of CD filesystems caused a system panic. |
When running a sparc with a serial console, certain types of interrupts would |
<br> |
cause great grief.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="uselogin"> |
|
<strong>006: SECURITY FIX: June 6, 2000</strong> |
<li id="sshforwarding"> |
|
<strong>035: SECURITY FIX: Nov 10, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
be used. On other operating systems, it results in a hole.<br> |
This problem is fixed as of OpenSSH 2.3.0.<br> |
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch"> |
|
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ipopts"> |
|
<strong>005: RELIABILITY FIX: May 29, 2000</strong> |
<li id="qe"> |
<i>All architectures</i><br> |
<strong>036: RELIABILITY FIX: Nov 17, 2000</strong><br> |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
Configuring a qec+qe causes a NMI panic.<br> |
to crash the machine remote or locally. |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch"> |
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="route"> |
|
<strong>004: RELIABILITY FIX: May 29, 2000</strong> |
<li id="ftpd"> |
|
<strong>037: SECURITY FIX: Dec 4, 2000</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Certain routing table modifications by the superuser could cause a system panic. |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch"> |
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="bridge"> |
|
<strong>003: SECURITY FIX: May 26, 2000</strong> |
<li id="sudo"> |
|
<strong>039: SECURITY FIX: Feb 22, 2001</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
There is an exploitable heap corruption bug in |
go directly to the machine acting as a |
<a href="https://man.openbsd.org/OpenBSD-2.7/sudo.8">sudo</a>. |
<a href="https://man.openbsd.org/OpenBSD-2.7/bridge.4">bridge</a>. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<li id="ef"> |
|
<strong>002: DRIVER FIX: May 26, 2000</strong> |
<li id="readline"> |
|
<strong>040: SECURITY FIX: Mar 18, 2001</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
The |
The readline library shipped with OpenBSD allows history files creation |
<a href="https://man.openbsd.org/OpenBSD-2.7/ef.4">ef(4)</a> |
with a permissive |
driver will complain when adding an address with ifconfig |
<a href="https://man.openbsd.org/OpenBSD-2.7/umask.2">umask(2)</a>. |
(ifconfig: SIOCAIFADDR: Invalid argument).<br> |
This can lead to the leakage of sensitive information in applications |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch"> |
that use passwords and the like during user interaction (one such |
|
application is mysql). Additionally, if the HOME environment variable |
|
is not set, the current working directory is used; this patch disables |
|
the history file if HOME is not set.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
|
<li id="ipf"> |
|
<strong>001: SECURITY FIX: May 25, 2000</strong> |
|
<i>All architectures</i><br> |
|
A misuse of ipf(8) |
|
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
It updates ipf to version 3.3.16. |
|
<p> |
<p> |
|
|
</ul> |
</ul> |