[BACK]Return to errata31.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata31.html between version 1.87 and 1.88

version 1.87, 2019/04/02 12:46:56 version 1.88, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.1 Errata</title>  <title>OpenBSD 3.1 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata31.html">  <link rel="canonical" href="https://www.openbsd.org/errata31.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.1 Errata</font>  3.1 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 87 
Line 85 
   
 <ul>  <ul>
 <li id="sendmail2">  <li id="sendmail2">
 <font color="#009000"><strong>027: SECURITY FIX: March 31, 2003</strong></font>  <strong>027: SECURITY FIX: March 31, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow in the address parsing in  A buffer overflow in the address parsing in
 <a href="https://man.openbsd.org/OpenBSD-3.1/sendmail.8">sendmail(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/sendmail.8">sendmail(8)</a>
Line 96 
Line 94 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kerberos">  <li id="kerberos">
 <font color="#009000"><strong>026: SECURITY FIX: March 24, 2003</strong></font>  <strong>026: SECURITY FIX: March 24, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The cryptographic weaknesses in the Kerberos v4 protocol can be exploited  The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
 on Kerberos v5 as well.  on Kerberos v5 as well.
Line 105 
Line 103 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kpr">  <li id="kpr">
 <font color="#009000"><strong>025: SECURITY FIX: March 19, 2003</strong></font>  <strong>025: SECURITY FIX: March 19, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack designed  OpenSSL is vulnerable to an extension of the "Bleichenbacher" attack designed
 by Czech researchers Klima, Pokorny and Rosa.  by Czech researchers Klima, Pokorny and Rosa.
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/025_kpr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/025_kpr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="blinding">  <li id="blinding">
 <font color="#009000"><strong>024: SECURITY FIX: March 18, 2003</strong></font>  <strong>024: SECURITY FIX: March 18, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.  Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
 <br>  <br>
Line 122 
Line 120 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="lprm">  <li id="lprm">
 <font color="#009000"><strong>023: SECURITY FIX: March 5, 2003</strong></font>  <strong>023: SECURITY FIX: March 5, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A fix for an  A fix for an
 <a href="https://man.openbsd.org/OpenBSD-3.1/lprm.1">lprm(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/lprm.1">lprm(1)</a>
Line 132 
Line 130 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>022: SECURITY FIX: March 3, 2003</strong></font>  <strong>022: SECURITY FIX: March 3, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow in the envelope comments processing in  A buffer overflow in the envelope comments processing in
 <a href="https://man.openbsd.org/OpenBSD-3.1/sendmail.8">sendmail(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/sendmail.8">sendmail(8)</a>
Line 141 
Line 139 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ssl2">  <li id="ssl2">
 <font color="#009000"><strong>021: SECURITY FIX: February 23, 2003</strong></font>  <strong>021: SECURITY FIX: February 23, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 In  In
 <a href="https://man.openbsd.org/OpenBSD-3.1/ssl.8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation  <a href="https://man.openbsd.org/OpenBSD-3.1/ssl.8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation
Line 151 
Line 149 
 A source code patch exists which fixes these two issues</a>.  A source code patch exists which fixes these two issues</a>.
 <p>  <p>
 <li id="cvs">  <li id="cvs">
 <font color="#009000"><strong>020: SECURITY FIX: January 20, 2003</strong></font>  <strong>020: SECURITY FIX: January 20, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A double free in  A double free in
 <a href="https://man.openbsd.org/OpenBSD-3.1/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/cvs.1">cvs(1)</a>
Line 164 
Line 162 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="named">  <li id="named">
 <font color="#009000"><strong>019: SECURITY FIX: November 14, 2002</strong></font>  <strong>019: SECURITY FIX: November 14, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow in  A buffer overflow in
 <a href="https://man.openbsd.org/OpenBSD-3.1/named.8">named(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/named.8">named(8)</a>
Line 175 
Line 173 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kernresource">  <li id="kernresource">
 <font color="#009000"><strong>018: SECURITY FIX: November 6, 2002</strong></font>  <strong>018: SECURITY FIX: November 6, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect argument checking in the  Incorrect argument checking in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/getrlimit.2">getrlimit(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/getrlimit.2">getrlimit(2)</a>
Line 184 
Line 182 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="smrsh">  <li id="smrsh">
 <font color="#009000"><strong>017: SECURITY FIX: November 6, 2002</strong></font>  <strong>017: SECURITY FIX: November 6, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An attacker can bypass the restrictions imposed by sendmail's restricted shell,  An attacker can bypass the restrictions imposed by sendmail's restricted shell,
 <a href="https://man.openbsd.org/OpenBSD-3.1/smrsh.8">smrsh(8)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.1/smrsh.8">smrsh(8)</a>,
Line 193 
Line 191 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kadmin">  <li id="kadmin">
 <font color="#009000"><strong>016: SECURITY FIX: October 21, 2002</strong></font>  <strong>016: SECURITY FIX: October 21, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the  A buffer overflow can occur in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/kadmind.8">kadmind(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/kadmind.8">kadmind(8)</a>
Line 202 
Line 200 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kerntime">  <li id="kerntime">
 <font color="#009000"><strong>015: SECURITY FIX: October 2, 2002</strong></font>  <strong>015: SECURITY FIX: October 2, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect argument checking in the  Incorrect argument checking in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/setitimer.2">setitimer(2)</a> system call may allow an attacker to write to kernel memory.<br>  <a href="https://man.openbsd.org/OpenBSD-3.1/setitimer.2">setitimer(2)</a> system call may allow an attacker to write to kernel memory.<br>
Line 210 
Line 208 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="scarg">  <li id="scarg">
 <font color="#009000"><strong>014: SECURITY FIX: August 11, 2002</strong></font>  <strong>014: SECURITY FIX: August 11, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An insufficient boundary check in the  An insufficient boundary check in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/select.2">select(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/select.2">select(2)</a>
Line 220 
Line 218 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ssl">  <li id="ssl">
 <font color="#009000"><strong>013: SECURITY FIX: July 30, 2002</strong></font>  <strong>013: SECURITY FIX: July 30, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the  Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the
 <a href="https://man.openbsd.org/OpenBSD-3.1/ssl.8">ssl(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/ssl.8">ssl(8)</a>
Line 233 
Line 231 
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li id="xdr">  <li id="xdr">
 <font color="#009000"><strong>012: SECURITY FIX: July 29, 2002</strong></font>  <strong>012: SECURITY FIX: July 29, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the  A buffer overflow can occur in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/xdr_array.3">xdr_array(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/xdr_array.3">xdr_array(3)</a>
Line 244 
Line 242 
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li id="pppd">  <li id="pppd">
 <font color="#009000"><strong>011: SECURITY FIX: July 29, 2002</strong></font>  <strong>011: SECURITY FIX: July 29, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists in the  A race condition exists in the
 <a href="https://man.openbsd.org/OpenBSD-3.1/pppd.8">pppd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.1/pppd.8">pppd(8)</a>
Line 253 
Line 251 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>010: RELIABILITY FIX: July 5, 2002</strong></font>  <strong>010: RELIABILITY FIX: July 5, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Receiving IKE payloads out of sequence can cause  Receiving IKE payloads out of sequence can cause
 <a href="https://man.openbsd.org/OpenBSD-3.1/isakmpd.8">isakmpd(8)</a> to crash.<br>  <a href="https://man.openbsd.org/OpenBSD-3.1/isakmpd.8">isakmpd(8)</a> to crash.<br>
Line 263 
Line 261 
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li id="ktrace">  <li id="ktrace">
 <font color="#009000"><strong>009: SECURITY FIX: June 27, 2002</strong></font>  <strong>009: SECURITY FIX: June 27, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The kernel would let any user <a href="https://man.openbsd.org/OpenBSD-3.1/ktrace.2">ktrace(2)</a> set[ug]id processes.<br>  The kernel would let any user <a href="https://man.openbsd.org/OpenBSD-3.1/ktrace.2">ktrace(2)</a> set[ug]id processes.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/009_ktrace.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/009_ktrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="modssl">  <li id="modssl">
 <font color="#009000"><strong>008: SECURITY FIX: June 26, 2002</strong></font>  <strong>008: SECURITY FIX: June 26, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd  A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd
 module, leading to possible remote crash or exploit.<br>  module, leading to possible remote crash or exploit.<br>
Line 278 
Line 276 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="resolver">  <li id="resolver">
 <font color="#009000"><strong>007: SECURITY FIX: June 25, 2002</strong></font>  <strong>007: SECURITY FIX: June 25, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential buffer overflow in the DNS resolver has been found.<br>  A potential buffer overflow in the DNS resolver has been found.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/007_resolver.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/007_resolver.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sshd">  <li id="sshd">
 <font color="#009000"><strong>006: SECURITY FIX: June 24, 2002</strong></font>  <strong>006: SECURITY FIX: June 24, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation  All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation
 error that can result in an integer overflow and privilege escalation.  error that can result in an integer overflow and privilege escalation.
Line 294 
Line 292 
 <a href="https://www.openssh.com/txt/preauth.adv">security advisory</a>.  <a href="https://www.openssh.com/txt/preauth.adv">security advisory</a>.
 <p>  <p>
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>005: SECURITY FIX: June 19, 2002</strong></font>  <strong>005: SECURITY FIX: June 19, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur during the interpretation of chunked  A buffer overflow can occur during the interpretation of chunked
 encoding in the http daemon, leading to possible remote crash or exploit.<br>  encoding in the http daemon, leading to possible remote crash or exploit.<br>
Line 302 
Line 300 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sshbsdauth">  <li id="sshbsdauth">
 <font color="#009000"><strong>004: SECURITY FIX: May 22, 2002</strong></font>  <strong>004: SECURITY FIX: May 22, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under certain conditions, on systems using YP with netgroups in the  Under certain conditions, on systems using YP with netgroups in the
 password database, it is possible that  password database, it is possible that
Line 315 
Line 313 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="fdalloc2">  <li id="fdalloc2">
 <font color="#009000"><strong>003: SECURITY FIX: May 8, 2002</strong></font>  <strong>003: SECURITY FIX: May 8, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists where an attacker could fill the file descriptor  A race condition exists where an attacker could fill the file descriptor
 table and defeat the kernel's protection of fd slots 0, 1, and 2 for a  table and defeat the kernel's protection of fd slots 0, 1, and 2 for a
Line 324 
Line 322 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sudo">  <li id="sudo">
 <font color="#009000"><strong>002: SECURITY FIX: April 25, 2002</strong></font>  <strong>002: SECURITY FIX: April 25, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A bug in <a href="https://man.openbsd.org/OpenBSD-3.1/sudo.8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>  A bug in <a href="https://man.openbsd.org/OpenBSD-3.1/sudo.8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/002_sudo.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/002_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sshafs">  <li id="sshafs">
 <font color="#009000"><strong>001: SECURITY FIX: April 22, 2002</strong></font>  <strong>001: SECURITY FIX: April 22, 2002</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A local user can gain super-user privileges due to a buffer overflow  A local user can gain super-user privileges due to a buffer overflow
 in <a href="https://man.openbsd.org/OpenBSD-3.1/sshd.8">sshd(8)</a>  in <a href="https://man.openbsd.org/OpenBSD-3.1/sshd.8">sshd(8)</a>
Line 346 
Line 344 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.87  
changed lines
  Added in v.1.88