version 1.32, 2002/10/17 21:38:38 |
version 1.33, 2003/03/06 21:44:07 |
|
|
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML Strict//EN"> |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> |
<html> |
<html> |
<head> |
<head> |
<title>OpenBSD 2.7 errata</title> |
<title>OpenBSD 2.7 errata</title> |
<link rev=made href=mailto:www@openbsd.org> |
<link rev=made href="mailto:www@openbsd.org"> |
<meta name="resource-type" content="document"> |
<meta name="resource-type" content="document"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="keywords" content="openbsd,cd,errata"> |
<meta name="keywords" content="openbsd,cd,errata"> |
|
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
|
|
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a> |
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a> |
<h2><font color=#0000e0> |
<h2><font color="#0000e0"> |
This is the OpenBSD 2.7 release errata & patch list: |
This is the OpenBSD 2.7 release errata & patch list: |
|
|
</font></h2> |
</font></h2> |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
|
|
|
|
|
|
<dl> |
<dl> |
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
<a name=readline></a> |
<a name=readline></a> |
<li><font color=#009000><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br> |
<li><font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br> |
The readline library shipped with OpenBSD allows history files creation |
The readline library shipped with OpenBSD allows history files creation |
with a permissive |
with a permissive |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>. |
This can lead to the leakage of sensitive information in applications |
This can lead to the leakage of sensitive information in applications |
that use passwords and the like during user interaction (one such |
that use passwords and the like during user interaction (one such |
application is mysql). Additionally, if the HOME environment variable |
application is mysql). Additionally, if the HOME environment variable |
|
|
">A source code patch exists which remedies the problem.</a><br> |
">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=sudo></a> |
<a name=sudo></a> |
<li><font color=#009000><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br> |
<li><font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br> |
There is an exploitable heap corruption bug in |
There is an exploitable heap corruption bug in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br> |
<p> |
<p> |
<a name=ftpd></a> |
<a name=ftpd></a> |
<li><font color=#009000><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br> |
<li><font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br> |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch"> |
A source code patch exists which remedies the problem.</a> |
A source code patch exists which remedies the problem.</a> |
<p> |
<p> |
<a name=sshforwarding> </a> |
<a name=sshforwarding> </a> |
<li><font color=#009000><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br> |
<li><font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br> |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
This problem is fixed as of OpenSSH 2.3.0.<br> |
This problem is fixed as of OpenSSH 2.3.0.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=execsubr> </a> |
<a name=execsubr> </a> |
<li><font color=#009000><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br> |
<li><font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br> |
Invalid fields in the exec header could cause a crash.<br> |
Invalid fields in the exec header could cause a crash.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=xtrans> </a> |
<a name=xtrans> </a> |
<li><font color=#009000><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br> |
<li><font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br> |
There are two possibly exploitable potential buffer overflows in the X11 |
There are two possibly exploitable potential buffer overflows in the X11 |
libraries using the xtrans code. One of these vulnerabilities was |
libraries using the xtrans code. One of these vulnerabilities was |
reported to the |
reported to the |
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a> |
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a> |
mailing list. |
mailing list. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=httpd></a> |
<a name=httpd></a> |
<li><font color=#009000><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br> |
<li><font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br> |
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> |
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> |
that could cause arbitrary files accessible to the www user on the server |
that could cause arbitrary files accessible to the www user on the server |
to be exposed under certain configurations when these modules are used. |
to be exposed under certain configurations when these modules are used. |
(These modules are not active by default). |
(These modules are not active by default). |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=telnetd></a> |
<a name=telnetd></a> |
<li><font color=#009000><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br> |
<li><font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br> |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
and TERMCAP (when it starts with a '/') environment variables. |
and TERMCAP (when it starts with a '/') environment variables. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=sendmail></a> |
<a name=sendmail></a> |
<li><font color=#009000><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br> |
<li><font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br> |
There is a non-exploitable buffer overflow in sendmail's test mode. |
There is a non-exploitable buffer overflow in sendmail's test mode. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=format_strings></a> |
<a name=format_strings></a> |
<li><font color=#009000><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<li><font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br> |
There are printf-style format string bugs in several privileged programs. |
There are printf-style format string bugs in several privileged programs. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=curses></a> |
<a name=curses></a> |
<li><font color=#009000><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<li><font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br> |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
as well as in the TERMCAP environment variable for setuid and setgid |
as well as in the TERMCAP environment variable for setuid and setgid |
applications. |
applications. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=talkd></a> |
<a name=talkd></a> |
<li><font color=#009000><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br> |
<li><font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br> |
A format string vulnerability exists in talkd(8). It is not clear |
A format string vulnerability exists in talkd(8). It is not clear |
yet what the impact is. |
yet what the impact is. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=pw_error></a> |
<a name=pw_error></a> |
<li><font color=#009000><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br> |
<li><font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br> |
A format string vulnerability exists in the pw_error(3) function. This |
A format string vulnerability exists in the pw_error(3) function. This |
manifests itself as a security hole in the chpass utility. As a workaround |
manifests itself as a security hole in the chpass utility. As a workaround |
which disables its functionality, do |
which disables its functionality, do |
<pre> |
<pre> |
# chmod u-s /usr/bin/chpass |
# chmod u-s /usr/bin/chpass |
</pre> |
</pre> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ipsec></a> |
<a name=ipsec></a> |
<li><font color=#009000><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br> |
<li><font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br> |
Bad ESP/AH packets could cause a crash under certain conditions. |
Bad ESP/AH packets could cause a crash under certain conditions. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=xlock></a> |
<a name=xlock></a> |
<li><font color=#009000><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br> |
<li><font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br> |
A format string vulnerability exists in xlock. As a workaround which disables |
A format string vulnerability exists in xlock. As a workaround which disables |
its functionality, do |
its functionality, do |
<pre> |
<pre> |
# chmod u-s /usr/X11R6/bin/xlock |
# chmod u-s /usr/X11R6/bin/xlock |
</pre> |
</pre> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=X11_libs></a> |
<a name=X11_libs></a> |
<li><font color=#009000><strong>021: SECURITY FIX: July 14, 2000</strong></font><br> |
<li><font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font><br> |
Various problems in X11 libraries have various side effects. We provide a |
Various problems in X11 libraries have various side effects. We provide a |
jumbo patch to fix them.<p> |
jumbo patch to fix them.<p> |
<ul> |
<ul> |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-15&msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk"> |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-15&msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk"> |
Nasty X Server Dos</a><br> |
Nasty X Server Dos</a><br> |
This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>. |
This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>. |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk"> |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk"> |
Various nasty libX11 holes</a><br> |
Various nasty libX11 holes</a><br> |
This is covered by the patches to <b>xc/lib/X11</b>. |
This is covered by the patches to <b>xc/lib/X11</b>. |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk"> |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk"> |
libICE DoS</a><br> |
libICE DoS</a><br> |
This is covered by the patches to <b>xc/lib/ICE</b>. |
This is covered by the patches to <b>xc/lib/ICE</b>. |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=Pine.LNX.4.10.10004161835150.863-100000@localhost"> |
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=Pine.LNX.4.10.10004161835150.863-100000@localhost"> |
Server overflow</a><br> |
Server overflow</a><br> |
This is covered by the patches to <b>xc/programs/Xserver/xkb</b>. |
This is covered by the patches to <b>xc/programs/Xserver/xkb</b>. |
<br> |
<br> |
|
|
the XFree86 Xwrapper already has tests for bad arguments. |
the XFree86 Xwrapper already has tests for bad arguments. |
</ul> |
</ul> |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch"> |
A source code patch exists which remedies these problems.</a><br> |
A source code patch exists which remedies these problems.</a><br> |
<strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br> |
<strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br> |
<strong>Note 2:</strong> When re-building use the command |
<strong>Note 2:</strong> When re-building use the command |
|
|
time /etc/weekly runs. |
time /etc/weekly runs. |
<p> |
<p> |
<a name=ftpd></a> |
<a name=ftpd></a> |
<li><font color=#009000><strong>019: SECURITY FIX: July 5, 2000</strong></font><br> |
<li><font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font><br> |
Just like pretty much all the other unix ftp daemons on the planet, |
Just like pretty much all the other unix ftp daemons on the planet, |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
The problem exists if anonymous ftp is enabled. |
The problem exists if anonymous ftp is enabled. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=mopd></a> |
<a name=mopd></a> |
<li><font color=#009000><strong>018: SECURITY FIX: July 5, 2000</strong></font><br> |
<li><font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font><br> |
Mopd contained a buffer overflow. |
Mopd contained a buffer overflow. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=screen></a> |
<a name=screen></a> |
<li><font color=#009000><strong>017: INSTALLATION FIX: July 3, 2000</strong></font> |
<li><font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font> |
<br> |
<br> |
The screen package shipped with 2.7 does not install itself properly. The |
The screen package shipped with 2.7 does not install itself properly. The |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
screen-3.9.5.tgz.old and a replacement package has been provided under the |
name screen-3.9.5p1.tgz. |
name screen-3.9.5p1.tgz. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=libedit></a> |
<a name=libedit></a> |
<li><font color=#009000><strong>013: SECURITY FIX: June 28, 2000</strong></font><br> |
<li><font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font><br> |
libedit would check for a <b>.editrc</b> file in the current directory. |
libedit would check for a <b>.editrc</b> file in the current directory. |
That behaviour is not nice; this does not turn into a security problem in |
That behaviour is not nice; this does not turn into a security problem in |
any real world situation that we know of, but a patch is available anyways. |
any real world situation that we know of, but a patch is available anyways. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=dhclient></a> |
<a name=dhclient></a> |
<li><font color=#009000><strong>012: SECURITY FIX: June 24, 2000</strong></font><br> |
<li><font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font><br> |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
server to be executed in the shell as root. |
server to be executed in the shell as root. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=isakmpd></a> |
<a name=isakmpd></a> |
<li><font color=#009000><strong>009: SECURITY FIX: June 9, 2000</strong></font><br> |
<li><font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font><br> |
A serious bug in isakmpd(8) policy handling wherein policy |
A serious bug in isakmpd(8) policy handling wherein policy |
verification could be completely bypassed in isakmpd. |
verification could be completely bypassed in isakmpd. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=msdosfs></a> |
<a name=msdosfs></a> |
<li><font color=#009000><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br> |
<li><font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br> |
Some operations in msdosfs could result in a system panic. |
Some operations in msdosfs could result in a system panic. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=cd9660></a> |
<a name=cd9660></a> |
<li><font color=#009000><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br> |
<li><font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br> |
NFS exporting of CD filesystems caused a system panic. |
NFS exporting of CD filesystems caused a system panic. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=uselogin></a> |
<a name=uselogin></a> |
<li><font color=#009000><strong>006: SECURITY FIX: June 6, 2000</strong></font><br> |
<li><font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font><br> |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
be used. On other operating systems, it results in a hole.<br> |
be used. On other operating systems, it results in a hole.<br> |
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
<p> |
<p> |
<a name=ipopts></a> |
<a name=ipopts></a> |
<li><font color=#009000><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br> |
<li><font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br> |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
to crash the machine remote or locally. |
to crash the machine remote or locally. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=route></a> |
<a name=route></a> |
<li><font color=#009000><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br> |
<li><font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br> |
Certain routing table modifications by the superuser could cause a system panic. |
Certain routing table modifications by the superuser could cause a system panic. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=bridge></a> |
<a name=bridge></a> |
<li><font color=#009000><strong>003: SECURITY FIX: May 26, 2000</strong></font><br> |
<li><font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font><br> |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
It is possible to bypass the <i>learning</i> flag on an interface if frames |
go directly to the machine acting as a |
go directly to the machine acting as a |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ef></a> |
<a name=ef></a> |
<li><font color=#009000><strong>002: DRIVER FIX: May 26, 2000</strong></font><br> |
<li><font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font><br> |
The |
The |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a> |
driver will complain when adding an address with ifconfig |
driver will complain when adding an address with ifconfig |
(ifconfig: SIOCAIFADDR: Invalid argument).<br> |
(ifconfig: SIOCAIFADDR: Invalid argument).<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ipf></a> |
<a name=ipf></a> |
<li><font color=#009000><strong>001: SECURITY FIX: May 25, 2000</strong></font><br> |
<li><font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font><br> |
A misuse of ipf(8) |
A misuse of ipf(8) |
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch"> |
A source code patch exists</a>, which remedies this problem, and updates ipf |
A source code patch exists</a>, which remedies this problem, and updates ipf |
to version 3.3.16. |
to version 3.3.16. |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color="#e00000">i386</font></h3> |
<ul> |
<ul> |
<a name=xlhash></a> |
<a name=xlhash></a> |
<li><font color=#009000><strong>016: DRIVER BUG: July 2, 2000</strong></font><br> |
<li><font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a> |
driver supporting various 3com cards, had a bug which prevented the multicast |
driver supporting various 3com cards, had a bug which prevented the multicast |
filter from working correctly on the 3c905B, thus preventing many IPv6 things |
filter from working correctly on the 3c905B, thus preventing many IPv6 things |
from working. |
from working. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ste></a> |
<a name=ste></a> |
<li><font color=#009000><strong>015: DRIVER BUG: June 30, 2000</strong></font><br> |
<li><font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&sektion=4">ste(4)</a> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&sektion=4">ste(4)</a> |
driver supporting Ethernet cards based on the Sundance ST201 chipset |
driver supporting Ethernet cards based on the Sundance ST201 chipset |
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at |
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at |
boot-time. |
boot-time. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=pcvt></a> |
<a name=pcvt></a> |
<li><font color=#009000><strong>014: DRIVER BUG: June 30, 2000</strong></font><br> |
<li><font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br> |
The PC console driver (PCVT) has two bugs. Display problems can result if |
The PC console driver (PCVT) has two bugs. Display problems can result if |
reverse video mode is turned on or off twice in a row. This patch also |
reverse video mode is turned on or off twice in a row. This patch also |
fixes a problem with scrolling region handling that has been seen by many |
fixes a problem with scrolling region handling that has been seen by many |
users trying to use the BitchX irc client with the screen program.<br> |
users trying to use the BitchX irc client with the screen program.<br> |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch"> |
There is now a second revision of the source code patch which remedies this problem.</a> |
There is now a second revision of the source code patch which remedies this problem.</a> |
<p> |
<p> |
<a name=if_an></a> |
<a name=if_an></a> |
<li><font color=#009000><strong>011: DRIVER BUG: June 17, 2000</strong></font><br> |
<li><font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&sektion=4">an(4)</a> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&sektion=4">an(4)</a> |
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents |
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=mac68k></a> |
<a name=mac68k></a> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<li><h3><font color="#e00000">mac68k</font></h3> |
<ul> |
<ul> |
<a name=mac68k_arandom></a> |
<a name=mac68k_arandom></a> |
<li><font color=#009000><strong>022: INSTALLATION FIX: July 14, 2000</strong></font> |
<li><font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font> |
<br> |
<br> |
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all |
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all |
devices, specifically it does not make the <tt>/dev/arandom</tt> device |
devices, specifically it does not make the <tt>/dev/arandom</tt> device |
|
|
</ul> |
</ul> |
<p> |
<p> |
<a name=sparc></a> |
<a name=sparc></a> |
<li><h3><font color=#e00000>sparc</font></h3> |
<li><h3><font color="#e00000">sparc</font></h3> |
<ul> |
<ul> |
<a name=qe> </a> |
<a name=qe> </a> |
<li><font color=#009000><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br> |
<li><font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br> |
Configuring a qec+qe causes a NMI panic.<br> |
Configuring a qec+qe causes a NMI panic.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=zsconsole> </a> |
<a name=zsconsole> </a> |
<li><font color=#009000><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br> |
<li><font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br> |
When running a sparc with a serial console, certain types of interrupts would |
When running a sparc with a serial console, certain types of interrupts would |
cause great grief.<br> |
cause great grief.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=amiga></a> |
<a name=amiga></a> |
<li><h3><font color=#e00000>amiga</font></h3> |
<li><h3><font color="#e00000">amiga</font></h3> |
<ul> |
<ul> |
<a name=amiga_cd></a> |
<a name=amiga_cd></a> |
<li><font color=#009000><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br> |
<li><font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br> |
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives |
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives |
files for installation, ie: |
files for installation, ie: |
<pre> |
<pre> |
|
|
</ul> |
</ul> |
<p> |
<p> |
<a name=pmax></a> |
<a name=pmax></a> |
<li><h3><font color=#e00000>pmax</font></h3> |
<li><h3><font color="#e00000">pmax</font></h3> |
<ul> |
<ul> |
<a name=pmax_msgbuf></a> |
<a name=pmax_msgbuf></a> |
<li><font color=#009000><strong>020: KERNEL BUG: July 10, 2000</strong></font><br> |
<li><font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br> |
As originally shipped, the pmax port would fail to install due to |
As originally shipped, the pmax port would fail to install due to |
<b>/kern/msgbuf</b> bugs.<br> |
<b>/kern/msgbuf</b> bugs.<br> |
The necessary fixes have been merged, |
The necessary fixes have been merged, |
|
|
<a href=stable.html>stable release source tree</a> or apply the |
<a href=stable.html>stable release source tree</a> or apply the |
provided patch to a 2.7 source tree. |
provided patch to a 2.7 source tree. |
<br> |
<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=arc></a> |
<a name=arc></a> |
<li><h3><font color=#e00000>arc</font></h3> |
<li><h3><font color="#e00000">arc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=alpha></a> |
<a name=alpha></a> |
<li><h3><font color=#e00000>alpha</font></h3> |
<li><h3><font color="#e00000">alpha</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=hp300></a> |
<a name=hp300></a> |
<li><h3><font color=#e00000>hp300</font></h3> |
<li><h3><font color="#e00000">hp300</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=mvme68k></a> |
<a name=mvme68k></a> |
<li><h3><font color=#e00000>mvme68k</font></h3> |
<li><h3><font color="#e00000">mvme68k</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=powerpc></a> |
<a name=powerpc></a> |
<li><h3><font color=#e00000>powerpc</font></h3> |
<li><h3><font color="#e00000">powerpc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
|
|
|
|
<hr> |
<hr> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=mailto:www@openbsd.org>www@openbsd.org</a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<br><small>$OpenBSD$</small> |
<br><small>$OpenBSD$</small> |
|
|
</body> |
</body> |