=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata28.html,v retrieving revision 1.62 retrieving revision 1.63 diff -u -r1.62 -r1.63 --- www/errata28.html 2014/03/28 03:04:30 1.62 +++ www/errata28.html 2014/03/31 03:12:47 1.63 @@ -6,7 +6,6 @@ - @@ -64,13 +63,16 @@ You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. +

-

The patches below are available in CVS via the +The patches below are available in CVS via the OPENBSD_2_8 patch branch. -

+ For more detailed information on how to install patches to OpenBSD, please -consult the OpenBSD FAQ. +consult the OpenBSD FAQ. +

+


@@ -86,7 +88,8 @@ some UUCP commands are run as root (and daemon) from cron it is possible to leverage compromise of the UUCP user to gain root.
-A source code patch exists which remedies the problem + +A source code patch exists which remedies this problem.

  • 032: SECURITY FIX: August 29, 2001
    @@ -97,7 +100,8 @@ access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv) may be used to mount an attack.
    -A source code patch exists which remedies the problem + +A source code patch exists which remedies this problem.

  • 031: SECURITY FIX: August 21, 2001
    @@ -105,14 +109,16 @@ that may allow an attacker on the local host to gain root privileges by specifying out-of-bounds debug parameters.
    -A source code patch exists which remedies the problem + +A source code patch exists which remedies this problem.

  • 030: SECURITY FIX: June 15, 2001
    A race condition exists in the kernel execve(2) implementation that opens a small window of vulnerability for a non-privileged user to ptrace(2) attach to a suid/sgid process.
    -A source code patch exists which remedies the problem. + +A source code patch exists which remedies this problem.

  • 029: SECURITY FIX: May 30, 2001
    @@ -122,7 +128,8 @@ parent dir is changed out from underneath it. This is similar to the old fts bug but happens when popping out of directories, as opposed to descending into them. -A source code patch exists which remedies the problem. + +A source code patch exists which remedies this problem. This is the second version of the patch.

  • @@ -132,22 +139,27 @@ context of a signal handler. This leads to potentially serious race conditions. At the moment this is a theoretical attack only and can only be exploited on the local host (if at all).
    -A source code patch exists which remedies the problem by updating sendmail to version 8.11.4. + +A source code patch exists which remedies this problem. +It updates sendmail to version 8.11.4.

  • 027: SECURITY FIX: Apr 23, 2001
    IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax "keep state".
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 026: SECURITY FIX: Apr 23, 2001
    ftpd(8) has a potential DoS related to glob(3). This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have 025_glob.patch installed before installing this patch.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 025: SECURITY FIX: Apr 10, 2001
    glob(3) contains multiple buffer overflows.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 024: SECURITY FIX: Mar 18, 2001
    @@ -157,51 +169,60 @@ This can lead to the leakage of sensitive information in applications that use passwords and the like during user interaction (one such application is mysql).
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 023: SECURITY FIX: Mar 2, 2001
    Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 021: SECURITY FIX: Feb 22, 2001
    There is an exploitable heap corruption bug in sudo.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 020: IMPLEMENTATION FIX: Feb 15, 2001
    Client side ident protocol was broken in libwrap, affecting anything using libwrap including tcpd. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 019: IMPLEMENTATION FIX: Jan 31, 2001
    Fix memory allocation in the PCI LANCE driver, le. A side effect of this is that OpenBSD under VMWare now works again.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 018: SECURITY FIX: Jan 29, 2001
    Merge named with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears that these were already impossible to exploit beforehand).
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 017: SECURITY FIX: Jan 22, 2001
    The rnd(4) device does not use all of its input when data is written to it.
    -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 016: RELIABILITY FIX: Jan 4, 2001
    Allow ThunderLAN cards to share interrupts nicely.
    -A source code patch exists which remedies the problem. + +A source code patch exists which remedies this problem.

  • 014: SECURITY FIX: Dec 22, 2000
    Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.
    -A source code patch exists which remedies the problem. + +A source code patch exists which remedies this problem.

    In addition to a source code patch, new xlock binaries have been created for each architecture listed below. Place these binaries at /usr/X11R6/bin/xlock and chmod 4755 /usr/X11R6/bin/xlock. @@ -219,26 +240,27 @@

  • 013: SECURITY FIX: Dec 18, 2000
    Procfs contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD.
    -A source code patch exists which remedies the problem. + +A source code patch exists which remedies this problem.

  • 011: RELIABILITY FIX: Dec 13, 2000
    The crypto subsystem could incorrectly fail to run certain software ciphers, if a hardware card existed in the machine.
    -A source code patch exists which remedies the problem. +A source code patch exists which remedies this problem.

  • 010: RELIABILITY FIX: Dec 11, 2000
    A crash could occur during fast routing, if IPSEC was enabled.
    -A source code patch exists which remedies the problem. +A source code patch exists which remedies this problem.

  • 009: SECURITY FIX: Dec 10, 2000
    Another problem exists in the Kerberos libraries.
    -A source code patch exists which remedies the problem. +A source code patch exists which remedies this problem.

  • 008: SECURITY FIX: Dec 7, 2000
    @@ -253,13 +275,13 @@ time what the impact is, but we recommend everyone to upgrade their machines immediately.

    -A source code patch exists which remedies the problem. +A source code patch exists which remedies this problem.

  • 005: SECURITY FIX: Dec 4, 2000
    OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.
    -A source code patch exists which remedies the problem.
    +A source code patch exists which remedies this problem. You can view the OpenBSD Advisory here.

  • @@ -268,7 +290,8 @@ and swap encryption.
    Secondly, the AES code did not work properly on big endian machines.
    -A second revision source code patch exists which remedies the problem. +A source code patch exists which remedies this problem. +This is the second revision of the patch.

  • 002: IMPLEMENTATION FIX: Nov 10, 2000
    @@ -284,12 +307,14 @@
  • 022: SECURITY FIX: Mar 2, 2001
    The USER_LDT kernel option allows an attacker to gain access to privileged areas of kernel memory. This option is not on by default. -A source code patch exists which remedies the problem.
    + +A source code patch exists which remedies this problem.

  • 015: STABILITY FIX: Dec 22, 2000
    Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.
    -A source code patch exists which remedies this problem. + +A source code patch exists which remedies this problem.

  • 006: STABILITY FIX: Dec 4, 2000
    @@ -374,12 +399,6 @@

    - -

    pmax

    - -

    hp300

    - -

    vax

    - -

    sun3