Annotation of www/errata32.html, Revision 1.60
1.1 deraadt 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2: <html>
3: <head>
4: <title>OpenBSD 3.2 errata</title>
5: <meta name="description" content="the OpenBSD CD errata page">
1.17 henning 6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.60 ! deraadt 7: <meta name="viewport" content="width=device-width, initial-scale=1">
! 8: <link rel="stylesheet" type="text/css" href="openbsd.css">
1.54 sthen 9: <link rel="canonical" href="http://www.openbsd.org/errata32.html">
1.1 deraadt 10: </head>
11:
1.50 deraadt 12: <!--
13: IMPORTANT REMINDER
14: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
15: -->
16:
1.18 david 17: <body bgcolor="#ffffff" text="#000000" link="#23238E">
1.1 deraadt 18:
1.60 ! deraadt 19: <h2>
! 20: <a href="index.html">
! 21: <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>
! 22: <font color="#e00000">3.2 errata</font>
! 23: <hr>
! 24: </h2>
1.1 deraadt 25:
26: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
1.2 margarid 27: <a href=pkg-stable32.html>For important packages updates, please refer here.</a><br>
1.1 deraadt 28: <br>
29: For errata on a certain release, click below:<br>
30: <a href="errata21.html">2.1</a>,
31: <a href="errata22.html">2.2</a>,
32: <a href="errata23.html">2.3</a>,
33: <a href="errata24.html">2.4</a>,
34: <a href="errata25.html">2.5</a>,
35: <a href="errata26.html">2.6</a>,
36: <a href="errata27.html">2.7</a>,
37: <a href="errata28.html">2.8</a>,
38: <a href="errata29.html">2.9</a>,
39: <a href="errata30.html">3.0</a>,
40: <a href="errata31.html">3.1</a>,
1.16 david 41: <a href="errata33.html">3.3</a>,
1.20 david 42: <a href="errata34.html">3.4</a>,
1.21 miod 43: <a href="errata35.html">3.5</a>,
1.22 deraadt 44: <a href="errata36.html">3.6</a>,
1.45 deraadt 45: <a href="errata37.html">3.7</a>,
1.30 deraadt 46: <br>
1.24 deraadt 47: <a href="errata38.html">3.8</a>,
1.25 deraadt 48: <a href="errata39.html">3.9</a>,
1.26 deraadt 49: <a href="errata40.html">4.0</a>,
1.28 merdely 50: <a href="errata41.html">4.1</a>,
1.29 deraadt 51: <a href="errata42.html">4.2</a>,
1.30 deraadt 52: <a href="errata43.html">4.3</a>,
1.32 deraadt 53: <a href="errata44.html">4.4</a>,
1.33 deraadt 54: <a href="errata45.html">4.5</a>,
1.34 deraadt 55: <a href="errata46.html">4.6</a>,
1.36 deraadt 56: <a href="errata47.html">4.7</a>,
1.37 miod 57: <a href="errata48.html">4.8</a>,
1.38 nick 58: <a href="errata49.html">4.9</a>,
1.39 sthen 59: <a href="errata50.html">5.0</a>,
1.40 deraadt 60: <a href="errata51.html">5.1</a>,
1.41 deraadt 61: <a href="errata52.html">5.2</a>,
1.42 deraadt 62: <a href="errata53.html">5.3</a>,
1.45 deraadt 63: <br>
1.43 deraadt 64: <a href="errata54.html">5.4</a>,
1.49 jsg 65: <a href="errata55.html">5.5</a>,
1.53 deraadt 66: <a href="errata56.html">5.6</a>,
1.56 deraadt 67: <a href="errata57.html">5.7</a>,
1.57 deraadt 68: <a href="errata58.html">5.8</a>,
69: <a href="errata59.html">5.9</a>.
1.1 deraadt 70: <br>
71: <hr>
72:
1.35 sthen 73: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2.tar.gz">
1.1 deraadt 74: You can also fetch a tar.gz file containing all the following patches</a>.
75: This file is updated once a day.
1.46 deraadt 76: <p>
1.1 deraadt 77:
1.46 deraadt 78: The patches below are available in CVS via the
1.1 deraadt 79: <code>OPENBSD_3_2</code> <a href="stable.html">patch branch</a>.
1.46 deraadt 80: <p>
1.1 deraadt 81:
82: For more detailed information on how to install patches to OpenBSD, please
83: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
1.46 deraadt 84: <p>
85:
1.1 deraadt 86: <hr>
87:
88: <ul>
1.51 bentley 89: <li id="arp">
1.48 deraadt 90: <font color="#009000"><strong>021: RELIABILITY FIX: October 1, 2003</strong></font>
91: <i>All architectures</i><br>
1.15 margarid 92: It is possible for a local user to cause a system panic by flooding it with spoofed ARP
93: requests.<br>
1.46 deraadt 94: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/021_arp.patch">
95: A source code patch exists which remedies this problem.</a>
1.15 margarid 96: <p>
1.51 bentley 97: <li id="asn1">
1.48 deraadt 98: <font color="#009000"><strong>020: SECURITY FIX: October 1, 2003</strong></font>
99: <i>All architectures</i><br>
1.11 millert 100: The use of certain ASN.1 encodings or malformed public keys may allow an
101: attacker to mount a denial of service attack against applications linked with
1.59 sthen 102: <a href="http://man.openbsd.org/?query=ssl&sektion=3">ssl(3)</a>.
1.14 margarid 103: This does not affect OpenSSH.<br>
1.46 deraadt 104: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">
105: A source code patch exists which remedies this problem.</a>
1.14 margarid 106: <p>
1.51 bentley 107: <li id="pfnorm">
1.48 deraadt 108: <font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font>
109: <i>All architectures</i><br>
1.43 deraadt 110: Three cases of potential access to freed memory have been found in
1.59 sthen 111: <a href="http://man.openbsd.org/?query=pf&sektion=4">pf(4)</a>.
1.14 margarid 112: At least one of them could be used to panic pf with active scrub rules remotely.<br>
1.46 deraadt 113: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">
114: A source code patch exists which remedies this problem.</a>
1.14 margarid 115: <p>
1.51 bentley 116: <li id="sendmail4">
1.48 deraadt 117: <font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font>
118: <i>All architectures</i><br>
1.9 millert 119: A buffer overflow in the address parsing in
1.59 sthen 120: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.9 millert 121: may allow an attacker to gain root privileges.<br>
1.46 deraadt 122: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/018_sendmail.patch">
123: A source code patch exists which remedies this problem.</a>
1.10 millert 124: NOTE: this is the <em>second</em> revision of the patch that fixes an additional
1.9 millert 125: <p>
1.51 bentley 126: <li id="sshbuffer">
1.48 deraadt 127: <font color="#009000"><strong>017: SECURITY FIX: September 16, 2003</strong></font>
128: <i>All architectures</i><br>
1.7 millert 129: All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
1.9 millert 130: It is unclear whether or not this bug is exploitable.<br>
1.46 deraadt 131: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/017_sshbuffer.patch">
132: A source code patch exists which remedies this problem.</a>
1.8 millert 133: NOTE: this is the <em>second</em> revision of the patch that fixes an additional
134: problem.
1.7 millert 135: <p>
1.51 bentley 136: <li id="sendmail3">
1.48 deraadt 137: <font color="#009000"><strong>016: SECURITY FIX: August 25, 2003</strong></font>
138: <i>All architectures</i><br>
1.6 brad 139: Fix for a potential security issue in
1.59 sthen 140: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 141: with respect to DNS maps. This only affects
1.59 sthen 142: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 143: configurations that use the "enhdnsbl"
144: feature. The default OpenBSD
1.59 sthen 145: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 146: config does not use this.<br>
1.46 deraadt 147: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/016_sendmail.patch">
148: A source code patch exists which remedies this problem.</a>
1.6 brad 149: <p>
1.51 bentley 150: <li id="realpath">
1.48 deraadt 151: <font color="#009000"><strong>015: SECURITY FIX: August 4, 2003</strong></font>
152: <i>All architectures</i><br>
1.5 millert 153: An off-by-one error exists in the C library function
1.59 sthen 154: <a href="http://man.openbsd.org/?query=realpath&sektion=3">realpath(3)</a>.
1.5 millert 155: Since this same bug resulted in a root compromise in the wu-ftpd ftp server
156: it is possible that this bug may allow an attacker to gain escalated privileges
157: on OpenBSD.<br>
1.46 deraadt 158: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/015_realpath.patch">
159: A source code patch exists which remedies this problem.</a>
1.5 millert 160: <p>
1.51 bentley 161: <li id="sendmail2">
1.48 deraadt 162: <font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font>
163: <i>All architectures</i><br>
1.3 miod 164: A buffer overflow in the address parsing in
1.59 sthen 165: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.3 miod 166: may allow an attacker to gain root privileges.<br>
1.46 deraadt 167: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/014_sendmail.patch">
168: A source code patch exists which remedies this problem.</a>
1.3 miod 169: <p>
1.51 bentley 170: <li id="kerberos">
1.48 deraadt 171: <font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font>
172: <i>All architectures</i><br>
1.4 margarid 173: The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
1.1 deraadt 174: on Kerberos v5 as well.
175: <br>
1.46 deraadt 176: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/013_kerberos.patch">
177: A source code patch exists which remedies this problem.</a>
1.1 deraadt 178: <p>
1.51 bentley 179: <li id="kpr">
1.48 deraadt 180: <font color="#009000"><strong>012: SECURITY FIX: March 19, 2003</strong></font>
181: <i>All architectures</i><br>
1.1 deraadt 182: OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack designed
183: by Czech researchers Klima, Pokorny and Rosa.
184: <br>
1.46 deraadt 185: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/012_kpr.patch">
186: A source code patch exists which remedies this problem.</a>
1.1 deraadt 187: <p>
1.51 bentley 188: <li id="blinding">
1.48 deraadt 189: <font color="#009000"><strong>011: SECURITY FIX: March 18, 2003</strong></font>
190: <i>All architectures</i><br>
1.1 deraadt 191: Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
192: <br>
1.46 deraadt 193: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/011_blinding.patch">
194: A source code patch exists which remedies this problem.</a>
1.1 deraadt 195: <p>
1.51 bentley 196: <li id="lprm">
1.48 deraadt 197: <font color="#009000"><strong>010: SECURITY FIX: March 5, 2003</strong></font>
198: <i>All architectures</i><br>
1.1 deraadt 199: A fix for an
1.59 sthen 200: <a href="http://man.openbsd.org/?query=lprm&sektion=1">lprm(1)</a>
1.1 deraadt 201: bug made in 1996 contains an error that could lead to privilege escalation.
202: For OpenBSD 3.2 the impact is limited since
1.59 sthen 203: <a href="http://man.openbsd.org/?query=lprm&sektion=1">lprm(1)</a>
1.1 deraadt 204: is setuid daemon, not setuid root.
205: <br>
1.46 deraadt 206: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch">
207: A source code patch exists which remedies this problem.</a>
1.1 deraadt 208: <p>
1.51 bentley 209: <li id="sendmail">
1.48 deraadt 210: <font color="#009000"><strong>009: SECURITY FIX: March 3, 2003</strong></font>
211: <i>All architectures</i><br>
1.1 deraadt 212: A buffer overflow in the envelope comments processing in
1.59 sthen 213: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.1 deraadt 214: may allow an attacker to gain root privileges.<br>
1.46 deraadt 215: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/009_sendmail.patch">
216: A source code patch exists which remedies this problem.</a>
1.1 deraadt 217: <p>
1.51 bentley 218: <li id="httpd">
1.48 deraadt 219: <font color="#009000"><strong>008: SECURITY FIX: February 25, 2003</strong></font>
220: <i>All architectures</i><br>
1.59 sthen 221: <a href="http://man.openbsd.org/?query=httpd&sektion=8">httpd(8)</a> leaks file inode numbers via ETag header as well as child PIDs in multipart MIME boundary generation. This could lead, for example, to NFS exploitation because it uses inode numbers as part of the file handle.<br>
1.46 deraadt 222: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/008_httpd.patch">
223: A source code patch exists which fixes these two issues</a>.
1.1 deraadt 224: <p>
1.51 bentley 225: <li id="ssl">
1.48 deraadt 226: <font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font>
227: <i>All architectures</i><br>
1.43 deraadt 228: In
1.59 sthen 229: <a href="http://man.openbsd.org/?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation
1.1 deraadt 230: even if incorrect block cipher padding has been found, this is a
231: countermeasure. Also, check for negative sizes in memory allocation routines.<br>
1.35 sthen 232: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/007_ssl.patch">A
1.1 deraadt 233: source code patch exists which fixes these two issues</a>.
234: <p>
1.51 bentley 235: <li id="cvs">
1.48 deraadt 236: <font color="#009000"><strong>006: SECURITY FIX: January 20, 2003</strong></font>
237: <i>All architectures</i><br>
1.1 deraadt 238: A double free in
1.59 sthen 239: <a href="http://man.openbsd.org/?query=cvs&sektion=1">cvs(1)</a>
1.1 deraadt 240: could allow an attacker to execute code with the privileges of the
241: user running cvs. This is only an issue when the cvs command is
242: being run on a user's behalf as a different user. This means that,
243: in most cases, the issue only exists for cvs configurations that use
244: the <em>pserver</em> client/server connection method.<br>
1.46 deraadt 245: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/006_cvs.patch">
246: A source code patch exists which remedies this problem.</a>
1.1 deraadt 247: <p>
1.51 bentley 248: <li id="named">
1.48 deraadt 249: <font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font>
250: <i>All architectures</i><br>
1.43 deraadt 251: A buffer overflow in
1.59 sthen 252: <a href="http://man.openbsd.org/?query=named&sektion=8">named(8)</a>
1.1 deraadt 253: could allow an attacker to execute code with the privileges of named.
254: On OpenBSD, named runs as a non-root user in a chrooted environment
255: which mitigates the effects of this bug.<br>
1.46 deraadt 256: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/005_named.patch">
257: A source code patch exists which remedies this problem.</a>
1.1 deraadt 258: <p>
1.51 bentley 259: <li id="pool">
1.48 deraadt 260: <font color="#009000"><strong>004: RELIABILITY FIX: November 6, 2002</strong></font>
261: <i>All architectures</i><br>
1.1 deraadt 262: A logic error in the
1.59 sthen 263: <a href="http://man.openbsd.org/?query=pool&sektion=9">pool</a>
1.1 deraadt 264: kernel memory allocator could cause memory corruption in low-memory situations,
265: causing the system to crash.<br>
1.46 deraadt 266: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/004_pool.patch">
267: A source code patch exists which remedies this problem.</a>
1.1 deraadt 268: <p>
1.51 bentley 269: <li id="smrsh">
1.48 deraadt 270: <font color="#009000"><strong>003: SECURITY FIX: November 6, 2002</strong></font>
271: <i>All architectures</i><br>
1.1 deraadt 272: An attacker can bypass the restrictions imposed by sendmail's restricted shell,
1.59 sthen 273: <a href="http://man.openbsd.org/?query=smrsh&sektion=8">smrsh(8)</a>,
1.1 deraadt 274: and execute arbitrary commands with the privileges of his own account.<br>
1.46 deraadt 275: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/003_smrsh.patch">
276: A source code patch exists which remedies this problem.</a>
1.1 deraadt 277: <p>
1.51 bentley 278: <li id="pfbridge">
1.48 deraadt 279: <font color="#009000"><strong>002: RELIABILITY FIX: November 6, 2002</strong></font>
280: <i>All architectures</i><br>
1.1 deraadt 281: Network
1.59 sthen 282: <a href="http://man.openbsd.org/?query=bridge&sektion=4">bridges</a>
1.1 deraadt 283: running
1.59 sthen 284: <a href="http://man.openbsd.org/?query=pf&sektion=4">pf</a>
1.1 deraadt 285: with scrubbing enabled could cause mbuf corruption,
286: causing the system to crash.<br>
1.46 deraadt 287: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/002_pfbridge.patch">
288: A source code patch exists which remedies this problem.</a>
1.1 deraadt 289: <p>
1.51 bentley 290: <li id="kadmin">
1.48 deraadt 291: <font color="#009000"><strong>001: SECURITY FIX: October 21, 2002</strong></font>
292: <i>All architectures</i><br>
1.1 deraadt 293: A buffer overflow can occur in the
1.59 sthen 294: <a href="http://man.openbsd.org/?query=kadmind&sektion=8">kadmind(8)</a>
1.1 deraadt 295: daemon, leading to possible remote crash or exploit.<br>
1.46 deraadt 296: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/001_kadmin.patch">
297: A source code patch exists which remedies this problem.</a>
1.1 deraadt 298: <p>
1.44 deraadt 299:
1.1 deraadt 300: </ul>
301:
1.52 tedu 302: <hr>
303:
1.1 deraadt 304: </body>
305: </html>