Annotation of www/errata32.html, Revision 1.66
1.1 deraadt 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2: <html>
3: <head>
1.62 tj 4: <title>OpenBSD 3.2 Errata</title>
1.1 deraadt 5: <meta name="description" content="the OpenBSD CD errata page">
1.17 henning 6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.60 deraadt 7: <meta name="viewport" content="width=device-width, initial-scale=1">
8: <link rel="stylesheet" type="text/css" href="openbsd.css">
1.64 tb 9: <link rel="canonical" href="https://www.openbsd.org/errata32.html">
1.1 deraadt 10: </head>
11:
1.50 deraadt 12: <!--
13: IMPORTANT REMINDER
14: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
15: -->
16:
1.18 david 17: <body bgcolor="#ffffff" text="#000000" link="#23238E">
1.1 deraadt 18:
1.60 deraadt 19: <h2>
20: <a href="index.html">
21: <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>
1.62 tj 22: <font color="#e00000">3.2 Errata</font>
23: </h2>
1.60 deraadt 24: <hr>
1.1 deraadt 25:
26: For errata on a certain release, click below:<br>
27: <a href="errata21.html">2.1</a>,
28: <a href="errata22.html">2.2</a>,
29: <a href="errata23.html">2.3</a>,
30: <a href="errata24.html">2.4</a>,
31: <a href="errata25.html">2.5</a>,
32: <a href="errata26.html">2.6</a>,
33: <a href="errata27.html">2.7</a>,
34: <a href="errata28.html">2.8</a>,
35: <a href="errata29.html">2.9</a>,
36: <a href="errata30.html">3.0</a>,
37: <a href="errata31.html">3.1</a>,
1.16 david 38: <a href="errata33.html">3.3</a>,
1.20 david 39: <a href="errata34.html">3.4</a>,
1.21 miod 40: <a href="errata35.html">3.5</a>,
1.22 deraadt 41: <a href="errata36.html">3.6</a>,
1.45 deraadt 42: <a href="errata37.html">3.7</a>,
1.30 deraadt 43: <br>
1.24 deraadt 44: <a href="errata38.html">3.8</a>,
1.25 deraadt 45: <a href="errata39.html">3.9</a>,
1.26 deraadt 46: <a href="errata40.html">4.0</a>,
1.28 merdely 47: <a href="errata41.html">4.1</a>,
1.29 deraadt 48: <a href="errata42.html">4.2</a>,
1.30 deraadt 49: <a href="errata43.html">4.3</a>,
1.32 deraadt 50: <a href="errata44.html">4.4</a>,
1.33 deraadt 51: <a href="errata45.html">4.5</a>,
1.34 deraadt 52: <a href="errata46.html">4.6</a>,
1.36 deraadt 53: <a href="errata47.html">4.7</a>,
1.37 miod 54: <a href="errata48.html">4.8</a>,
1.38 nick 55: <a href="errata49.html">4.9</a>,
1.39 sthen 56: <a href="errata50.html">5.0</a>,
1.40 deraadt 57: <a href="errata51.html">5.1</a>,
1.41 deraadt 58: <a href="errata52.html">5.2</a>,
1.42 deraadt 59: <a href="errata53.html">5.3</a>,
1.45 deraadt 60: <br>
1.43 deraadt 61: <a href="errata54.html">5.4</a>,
1.49 jsg 62: <a href="errata55.html">5.5</a>,
1.53 deraadt 63: <a href="errata56.html">5.6</a>,
1.56 deraadt 64: <a href="errata57.html">5.7</a>,
1.57 deraadt 65: <a href="errata58.html">5.8</a>,
1.63 deraadt 66: <a href="errata59.html">5.9</a>,
1.66 ! tj 67: <a href="errata60.html">6.0</a>,
! 68: <a href="errata61.html">6.1</a>.
1.1 deraadt 69: <hr>
70:
1.46 deraadt 71: <p>
1.66 ! tj 72: Patches for the OpenBSD base system are distributed as unified diffs.
! 73: Each patch contains usage instructions.
! 74: All the following patches are also available in one
! 75: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2.tar.gz">tar.gz file</a>
! 76: for convenience.
1.1 deraadt 77:
1.46 deraadt 78: <p>
1.66 ! tj 79: Patches for supported releases are also incorporated into the
! 80: <a href="stable.html">-stable branch</a>, which is maintained for one year
! 81: after release.
1.46 deraadt 82:
1.1 deraadt 83: <hr>
84:
85: <ul>
1.51 bentley 86: <li id="arp">
1.48 deraadt 87: <font color="#009000"><strong>021: RELIABILITY FIX: October 1, 2003</strong></font>
88: <i>All architectures</i><br>
1.15 margarid 89: It is possible for a local user to cause a system panic by flooding it with spoofed ARP
90: requests.<br>
1.65 tb 91: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/021_arp.patch">
1.46 deraadt 92: A source code patch exists which remedies this problem.</a>
1.15 margarid 93: <p>
1.51 bentley 94: <li id="asn1">
1.48 deraadt 95: <font color="#009000"><strong>020: SECURITY FIX: October 1, 2003</strong></font>
96: <i>All architectures</i><br>
1.11 millert 97: The use of certain ASN.1 encodings or malformed public keys may allow an
98: attacker to mount a denial of service attack against applications linked with
1.59 sthen 99: <a href="http://man.openbsd.org/?query=ssl&sektion=3">ssl(3)</a>.
1.14 margarid 100: This does not affect OpenSSH.<br>
1.65 tb 101: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">
1.46 deraadt 102: A source code patch exists which remedies this problem.</a>
1.14 margarid 103: <p>
1.51 bentley 104: <li id="pfnorm">
1.48 deraadt 105: <font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font>
106: <i>All architectures</i><br>
1.43 deraadt 107: Three cases of potential access to freed memory have been found in
1.59 sthen 108: <a href="http://man.openbsd.org/?query=pf&sektion=4">pf(4)</a>.
1.14 margarid 109: At least one of them could be used to panic pf with active scrub rules remotely.<br>
1.65 tb 110: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">
1.46 deraadt 111: A source code patch exists which remedies this problem.</a>
1.14 margarid 112: <p>
1.51 bentley 113: <li id="sendmail4">
1.48 deraadt 114: <font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font>
115: <i>All architectures</i><br>
1.9 millert 116: A buffer overflow in the address parsing in
1.59 sthen 117: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.9 millert 118: may allow an attacker to gain root privileges.<br>
1.65 tb 119: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/018_sendmail.patch">
1.46 deraadt 120: A source code patch exists which remedies this problem.</a>
1.10 millert 121: NOTE: this is the <em>second</em> revision of the patch that fixes an additional
1.9 millert 122: <p>
1.51 bentley 123: <li id="sshbuffer">
1.48 deraadt 124: <font color="#009000"><strong>017: SECURITY FIX: September 16, 2003</strong></font>
125: <i>All architectures</i><br>
1.7 millert 126: All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
1.9 millert 127: It is unclear whether or not this bug is exploitable.<br>
1.65 tb 128: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/017_sshbuffer.patch">
1.46 deraadt 129: A source code patch exists which remedies this problem.</a>
1.8 millert 130: NOTE: this is the <em>second</em> revision of the patch that fixes an additional
131: problem.
1.7 millert 132: <p>
1.51 bentley 133: <li id="sendmail3">
1.48 deraadt 134: <font color="#009000"><strong>016: SECURITY FIX: August 25, 2003</strong></font>
135: <i>All architectures</i><br>
1.6 brad 136: Fix for a potential security issue in
1.59 sthen 137: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 138: with respect to DNS maps. This only affects
1.59 sthen 139: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 140: configurations that use the "enhdnsbl"
141: feature. The default OpenBSD
1.59 sthen 142: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.6 brad 143: config does not use this.<br>
1.65 tb 144: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/016_sendmail.patch">
1.46 deraadt 145: A source code patch exists which remedies this problem.</a>
1.6 brad 146: <p>
1.51 bentley 147: <li id="realpath">
1.48 deraadt 148: <font color="#009000"><strong>015: SECURITY FIX: August 4, 2003</strong></font>
149: <i>All architectures</i><br>
1.5 millert 150: An off-by-one error exists in the C library function
1.59 sthen 151: <a href="http://man.openbsd.org/?query=realpath&sektion=3">realpath(3)</a>.
1.5 millert 152: Since this same bug resulted in a root compromise in the wu-ftpd ftp server
153: it is possible that this bug may allow an attacker to gain escalated privileges
154: on OpenBSD.<br>
1.65 tb 155: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/015_realpath.patch">
1.46 deraadt 156: A source code patch exists which remedies this problem.</a>
1.5 millert 157: <p>
1.51 bentley 158: <li id="sendmail2">
1.48 deraadt 159: <font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font>
160: <i>All architectures</i><br>
1.3 miod 161: A buffer overflow in the address parsing in
1.59 sthen 162: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.3 miod 163: may allow an attacker to gain root privileges.<br>
1.65 tb 164: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/014_sendmail.patch">
1.46 deraadt 165: A source code patch exists which remedies this problem.</a>
1.3 miod 166: <p>
1.51 bentley 167: <li id="kerberos">
1.48 deraadt 168: <font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font>
169: <i>All architectures</i><br>
1.4 margarid 170: The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
1.1 deraadt 171: on Kerberos v5 as well.
172: <br>
1.65 tb 173: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/013_kerberos.patch">
1.46 deraadt 174: A source code patch exists which remedies this problem.</a>
1.1 deraadt 175: <p>
1.51 bentley 176: <li id="kpr">
1.48 deraadt 177: <font color="#009000"><strong>012: SECURITY FIX: March 19, 2003</strong></font>
178: <i>All architectures</i><br>
1.1 deraadt 179: OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack designed
180: by Czech researchers Klima, Pokorny and Rosa.
181: <br>
1.65 tb 182: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/012_kpr.patch">
1.46 deraadt 183: A source code patch exists which remedies this problem.</a>
1.1 deraadt 184: <p>
1.51 bentley 185: <li id="blinding">
1.48 deraadt 186: <font color="#009000"><strong>011: SECURITY FIX: March 18, 2003</strong></font>
187: <i>All architectures</i><br>
1.1 deraadt 188: Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
189: <br>
1.65 tb 190: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/011_blinding.patch">
1.46 deraadt 191: A source code patch exists which remedies this problem.</a>
1.1 deraadt 192: <p>
1.51 bentley 193: <li id="lprm">
1.48 deraadt 194: <font color="#009000"><strong>010: SECURITY FIX: March 5, 2003</strong></font>
195: <i>All architectures</i><br>
1.1 deraadt 196: A fix for an
1.59 sthen 197: <a href="http://man.openbsd.org/?query=lprm&sektion=1">lprm(1)</a>
1.1 deraadt 198: bug made in 1996 contains an error that could lead to privilege escalation.
199: For OpenBSD 3.2 the impact is limited since
1.59 sthen 200: <a href="http://man.openbsd.org/?query=lprm&sektion=1">lprm(1)</a>
1.1 deraadt 201: is setuid daemon, not setuid root.
202: <br>
1.65 tb 203: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/010_lprm.patch">
1.46 deraadt 204: A source code patch exists which remedies this problem.</a>
1.1 deraadt 205: <p>
1.51 bentley 206: <li id="sendmail">
1.48 deraadt 207: <font color="#009000"><strong>009: SECURITY FIX: March 3, 2003</strong></font>
208: <i>All architectures</i><br>
1.1 deraadt 209: A buffer overflow in the envelope comments processing in
1.59 sthen 210: <a href="http://man.openbsd.org/?query=sendmail&sektion=8">sendmail(8)</a>
1.1 deraadt 211: may allow an attacker to gain root privileges.<br>
1.65 tb 212: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/009_sendmail.patch">
1.46 deraadt 213: A source code patch exists which remedies this problem.</a>
1.1 deraadt 214: <p>
1.51 bentley 215: <li id="httpd">
1.48 deraadt 216: <font color="#009000"><strong>008: SECURITY FIX: February 25, 2003</strong></font>
217: <i>All architectures</i><br>
1.59 sthen 218: <a href="http://man.openbsd.org/?query=httpd&sektion=8">httpd(8)</a> leaks file inode numbers via ETag header as well as child PIDs in multipart MIME boundary generation. This could lead, for example, to NFS exploitation because it uses inode numbers as part of the file handle.<br>
1.65 tb 219: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/008_httpd.patch">
1.46 deraadt 220: A source code patch exists which fixes these two issues</a>.
1.1 deraadt 221: <p>
1.51 bentley 222: <li id="ssl">
1.48 deraadt 223: <font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font>
224: <i>All architectures</i><br>
1.43 deraadt 225: In
1.59 sthen 226: <a href="http://man.openbsd.org/?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation
1.1 deraadt 227: even if incorrect block cipher padding has been found, this is a
228: countermeasure. Also, check for negative sizes in memory allocation routines.<br>
1.65 tb 229: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/007_ssl.patch">A
1.1 deraadt 230: source code patch exists which fixes these two issues</a>.
231: <p>
1.51 bentley 232: <li id="cvs">
1.48 deraadt 233: <font color="#009000"><strong>006: SECURITY FIX: January 20, 2003</strong></font>
234: <i>All architectures</i><br>
1.1 deraadt 235: A double free in
1.59 sthen 236: <a href="http://man.openbsd.org/?query=cvs&sektion=1">cvs(1)</a>
1.1 deraadt 237: could allow an attacker to execute code with the privileges of the
238: user running cvs. This is only an issue when the cvs command is
239: being run on a user's behalf as a different user. This means that,
240: in most cases, the issue only exists for cvs configurations that use
241: the <em>pserver</em> client/server connection method.<br>
1.65 tb 242: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/006_cvs.patch">
1.46 deraadt 243: A source code patch exists which remedies this problem.</a>
1.1 deraadt 244: <p>
1.51 bentley 245: <li id="named">
1.48 deraadt 246: <font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font>
247: <i>All architectures</i><br>
1.43 deraadt 248: A buffer overflow in
1.59 sthen 249: <a href="http://man.openbsd.org/?query=named&sektion=8">named(8)</a>
1.1 deraadt 250: could allow an attacker to execute code with the privileges of named.
251: On OpenBSD, named runs as a non-root user in a chrooted environment
252: which mitigates the effects of this bug.<br>
1.65 tb 253: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/005_named.patch">
1.46 deraadt 254: A source code patch exists which remedies this problem.</a>
1.1 deraadt 255: <p>
1.51 bentley 256: <li id="pool">
1.48 deraadt 257: <font color="#009000"><strong>004: RELIABILITY FIX: November 6, 2002</strong></font>
258: <i>All architectures</i><br>
1.1 deraadt 259: A logic error in the
1.59 sthen 260: <a href="http://man.openbsd.org/?query=pool&sektion=9">pool</a>
1.1 deraadt 261: kernel memory allocator could cause memory corruption in low-memory situations,
262: causing the system to crash.<br>
1.65 tb 263: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/004_pool.patch">
1.46 deraadt 264: A source code patch exists which remedies this problem.</a>
1.1 deraadt 265: <p>
1.51 bentley 266: <li id="smrsh">
1.48 deraadt 267: <font color="#009000"><strong>003: SECURITY FIX: November 6, 2002</strong></font>
268: <i>All architectures</i><br>
1.1 deraadt 269: An attacker can bypass the restrictions imposed by sendmail's restricted shell,
1.59 sthen 270: <a href="http://man.openbsd.org/?query=smrsh&sektion=8">smrsh(8)</a>,
1.1 deraadt 271: and execute arbitrary commands with the privileges of his own account.<br>
1.65 tb 272: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/003_smrsh.patch">
1.46 deraadt 273: A source code patch exists which remedies this problem.</a>
1.1 deraadt 274: <p>
1.51 bentley 275: <li id="pfbridge">
1.48 deraadt 276: <font color="#009000"><strong>002: RELIABILITY FIX: November 6, 2002</strong></font>
277: <i>All architectures</i><br>
1.1 deraadt 278: Network
1.59 sthen 279: <a href="http://man.openbsd.org/?query=bridge&sektion=4">bridges</a>
1.1 deraadt 280: running
1.59 sthen 281: <a href="http://man.openbsd.org/?query=pf&sektion=4">pf</a>
1.1 deraadt 282: with scrubbing enabled could cause mbuf corruption,
283: causing the system to crash.<br>
1.65 tb 284: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/002_pfbridge.patch">
1.46 deraadt 285: A source code patch exists which remedies this problem.</a>
1.1 deraadt 286: <p>
1.51 bentley 287: <li id="kadmin">
1.48 deraadt 288: <font color="#009000"><strong>001: SECURITY FIX: October 21, 2002</strong></font>
289: <i>All architectures</i><br>
1.1 deraadt 290: A buffer overflow can occur in the
1.59 sthen 291: <a href="http://man.openbsd.org/?query=kadmind&sektion=8">kadmind(8)</a>
1.1 deraadt 292: daemon, leading to possible remote crash or exploit.<br>
1.65 tb 293: <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/001_kadmin.patch">
1.46 deraadt 294: A source code patch exists which remedies this problem.</a>
1.1 deraadt 295: <p>
1.44 deraadt 296:
1.1 deraadt 297: </ul>
298:
1.52 tedu 299: <hr>
300:
1.1 deraadt 301: </body>
302: </html>