[BACK]Return to errata55.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata55.html between version 1.58 and 1.59

version 1.58, 2019/04/02 12:46:57 version 1.59, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 5.5 Errata</title>  <title>OpenBSD 5.5 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata55.html">  <link rel="canonical" href="https://www.openbsd.org/errata55.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
Line 15 
Line 14 
 -->  -->
   
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">5.5 Errata</font>  5.5 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 91 
Line 89 
 <ul>  <ul>
   
 <li id="p001_icmp">  <li id="p001_icmp">
 <font color="#009000"><strong>001: RELIABILITY FIX: March 15, 2014</strong></font>  <strong>001: RELIABILITY FIX: March 15, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Memory corruption happens during  Memory corruption happens during
 ICMP reflection handling.  ICMP reflection is disabled by default.  ICMP reflection handling.  ICMP reflection is disabled by default.
Line 101 
Line 99 
 <p>  <p>
   
 <li id="p002_openssl">  <li id="p002_openssl">
 <font color="#009000"><strong>002: SECURITY FIX: April 8, 2014</strong></font>  <strong>002: SECURITY FIX: April 8, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Missing bounds checking in OpenSSL's implementation of the TLS/DTLS  Missing bounds checking in OpenSSL's implementation of the TLS/DTLS
 heartbeat extension (RFC6520) which can result in a leak of memory contents.  heartbeat extension (RFC6520) which can result in a leak of memory contents.
Line 111 
Line 109 
 <p>  <p>
   
 <li id="p003_ftp">  <li id="p003_ftp">
 <font color="#009000"><strong>003: SECURITY FIX: April 9, 2014</strong></font>  <strong>003: SECURITY FIX: April 9, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Missing hostname check for HTTPS connections in the  Missing hostname check for HTTPS connections in the
 <a href="https://man.openbsd.org/OpenBSD-5.5/ftp.1">ftp(1)</a>  <a href="https://man.openbsd.org/OpenBSD-5.5/ftp.1">ftp(1)</a>
Line 122 
Line 120 
 <p>  <p>
   
 <li id="p004_openssl">  <li id="p004_openssl">
 <font color="#009000"><strong>004: SECURITY FIX: April 12, 2014</strong></font>  <strong>004: SECURITY FIX: April 12, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A use-after-free race condition in OpenSSL's read buffer may permit an attacker  A use-after-free race condition in OpenSSL's read buffer may permit an attacker
 to inject data from one connection into another.  to inject data from one connection into another.
Line 132 
Line 130 
 <p>  <p>
   
 <li id="p005_openssl">  <li id="p005_openssl">
 <font color="#009000"><strong>005: RELIABILITY FIX: May 1, 2014</strong></font>  <strong>005: RELIABILITY FIX: May 1, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An attacker can trigger generation of an SSL alert which could cause  An attacker can trigger generation of an SSL alert which could cause
 a null pointer dereference.  a null pointer dereference.
Line 142 
Line 140 
 <p>  <p>
   
 <li id="p006_libXfont">  <li id="p006_libXfont">
 <font color="#009000"><strong>006: SECURITY FIX: May 24, 2014</strong></font>  <strong>006: SECURITY FIX: May 24, 2014</strong>
 &nbsp; <i>All architectures with X server</i><br>  &nbsp; <i>All architectures with X server</i><br>
 X Font Service Protocol & Font metadata file handling issues in libXfont  X Font Service Protocol & Font metadata file handling issues in libXfont
 <ul>  <ul>
Line 157 
Line 155 
 <p>  <p>
   
 <li id="p007_sendmail">  <li id="p007_sendmail">
 <font color="#009000"><strong>007: SECURITY FIX: June 5, 2014</strong></font>  <strong>007: SECURITY FIX: June 5, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Sendmail was not properly closing file descriptions before executing programs.  Sendmail was not properly closing file descriptions before executing programs.
 This could enable local users to interfere with an open SMTP connection.  This could enable local users to interfere with an open SMTP connection.
Line 168 
Line 166 
 <p>  <p>
   
 <li id="p008_openssl">  <li id="p008_openssl">
 <font color="#009000"><strong>008: SECURITY FIX: June 6, 2014</strong></font>  <strong>008: SECURITY FIX: June 6, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 This patch contains a number of SSL library fixes.  This patch contains a number of SSL library fixes.
 <br>  <br>
Line 177 
Line 175 
 <p>  <p>
   
 <li id="p009_dhcp">  <li id="p009_dhcp">
 <font color="#009000"><strong>009: RELIABILITY FIX: July 30, 2014</strong></font>  <strong>009: RELIABILITY FIX: July 30, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Packets with illegal DHCP options can lead to memory exhaustion of  Packets with illegal DHCP options can lead to memory exhaustion of
 <a href="https://man.openbsd.org/OpenBSD-5.5/dhclient.8">dhclient(8)</a>  <a href="https://man.openbsd.org/OpenBSD-5.5/dhclient.8">dhclient(8)</a>
Line 189 
Line 187 
 <p>  <p>
   
 <li id="p010_openssl">  <li id="p010_openssl">
 <font color="#009000"><strong>010: SECURITY FIX: August 9, 2014</strong></font>  <strong>010: SECURITY FIX: August 9, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 This patch contains a number of SSL library fixes.  This patch contains a number of SSL library fixes.
 <br>  <br>
Line 198 
Line 196 
 <p>  <p>
   
 <li id="p011_nginx">  <li id="p011_nginx">
 <font color="#009000"><strong>011: SECURITY FIX: October 1, 2014</strong></font>  <strong>011: SECURITY FIX: October 1, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual  nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
 host confusion attacks in some configurations.  host confusion attacks in some configurations.
Line 209 
Line 207 
 <p>  <p>
   
 <li id="p012_openssl">  <li id="p012_openssl">
 <font color="#009000"><strong>012: RELIABILITY FIX: October 20, 2014</strong></font>  <strong>012: RELIABILITY FIX: October 20, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two remotely triggerable memory leaks in OpenSSL can lead to a denial of  Two remotely triggerable memory leaks in OpenSSL can lead to a denial of
 service in server applications.  service in server applications.
Line 219 
Line 217 
 <p>  <p>
   
 <li id="p013_kernexec">  <li id="p013_kernexec">
 <font color="#009000"><strong>013: RELIABILITY FIX: October 20, 2014</strong></font>  <strong>013: RELIABILITY FIX: October 20, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Executable headers with an unaligned address will trigger a kernel panic.  Executable headers with an unaligned address will trigger a kernel panic.
 <br>  <br>
Line 228 
Line 226 
 <p>  <p>
   
 <li id="p014_pfctl">  <li id="p014_pfctl">
 <font color="#009000"><strong>014: RELIABILITY FIX: November 17, 2014</strong></font>  <strong>014: RELIABILITY FIX: November 17, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A PF rule using an IPv4 address  A PF rule using an IPv4 address
 followed by an IPv6 address and then a dynamic address, e.g. "pass  followed by an IPv6 address and then a dynamic address, e.g. "pass
Line 240 
Line 238 
 <p>  <p>
   
 <li id="p015_asr">  <li id="p015_asr">
 <font color="#009000"><strong>015: RELIABILITY FIX: November 17, 2014</strong></font>  <strong>015: RELIABILITY FIX: November 17, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.  Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
 <br>  <br>
Line 249 
Line 247 
 <p>  <p>
   
 <li id="p016_pipex">  <li id="p016_pipex">
 <font color="#009000"><strong>016: RELIABILITY FIX: December 5, 2014</strong></font>  <strong>016: RELIABILITY FIX: December 5, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several bugs were fixed that allowed a crash from remote when an active pipex  Several bugs were fixed that allowed a crash from remote when an active pipex
 session exists.  session exists.
Line 259 
Line 257 
 <p>  <p>
   
 <li id="p017_pppoe">  <li id="p017_pppoe">
 <font color="#009000"><strong>017: RELIABILITY FIX: December 5, 2014</strong></font>  <strong>017: RELIABILITY FIX: December 5, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An incorrect memcpy call would result in corrupted MAC addresses when  An incorrect memcpy call would result in corrupted MAC addresses when
 using PPPOE.  using PPPOE.
Line 269 
Line 267 
 <p>  <p>
   
 <li id="p018_virtio">  <li id="p018_virtio">
 <font color="#009000"><strong>018: RELIABILITY FIX: December 9, 2014</strong></font>  <strong>018: RELIABILITY FIX: December 9, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several bugs in virtio(4) can lead to hangs with virtio devices,  Several bugs in virtio(4) can lead to hangs with virtio devices,
 like vio(4) and vioblk(4).  like vio(4) and vioblk(4).
Line 279 
Line 277 
 <p>  <p>
   
 <li id="p019_xserver">  <li id="p019_xserver">
 <font color="#009000"><strong>019: SECURITY FIX: December 9, 2014</strong></font>  <strong>019: SECURITY FIX: December 9, 2014</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 One year after Ilja van Sprundel discovered and reported a large number  One year after Ilja van Sprundel discovered and reported a large number
 of issues in the way the X server code base handles requests from X clients,  of issues in the way the X server code base handles requests from X clients,
Line 292 
Line 290 
 <p>  <p>
   
 <li id="p020_libevent">  <li id="p020_libevent">
 <font color="#009000"><strong>020: SECURITY FIX: January 13, 2015</strong></font>  <strong>020: SECURITY FIX: January 13, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD  Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD
 base uses it for the programs: cu tmux ftp-proxy httpd ldapd relayd  base uses it for the programs: cu tmux ftp-proxy httpd ldapd relayd
Line 305 
Line 303 
 <p>  <p>
   
 <li id="p021_xserver">  <li id="p021_xserver">
 <font color="#009000"><strong>021: SECURITY FIX: March 3, 2015</strong></font>  <strong>021: SECURITY FIX: March 3, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Information leak in the XkbSetGeometry request of X servers.  Information leak in the XkbSetGeometry request of X servers.
 <br>  <br>
Line 317 
Line 315 
 <p>  <p>
   
 <li id="p022_freetype">  <li id="p022_freetype">
 <font color="#009000"><strong>022: SECURITY FIX: March 13, 2015</strong></font>  <strong>022: SECURITY FIX: March 13, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Another fix for buffer overflows in malformed fonts.  Another fix for buffer overflows in malformed fonts.
 <br>  <br>
Line 326 
Line 324 
 <p>  <p>
   
 <li id="p023_libxfont">  <li id="p023_libxfont">
 <font color="#009000"><strong>023: SECURITY FIX: March 18, 2015</strong></font>  <strong>023: SECURITY FIX: March 18, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflows in libXfont  Buffer overflows in libXfont
 <br>  <br>
Line 339 
Line 337 
 <p>  <p>
   
 <li id="p024_openssl">  <li id="p024_openssl">
 <font color="#009000"><strong>024: SECURITY FIX: March 19, 2015</strong></font>  <strong>024: SECURITY FIX: March 19, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix two possible crash causing defects.<br>  Fix two possible crash causing defects.<br>
 CVE-2015-0286 - Apply fix from OpenSSL for ASN1_TYPE_cmp.<br>  CVE-2015-0286 - Apply fix from OpenSSL for ASN1_TYPE_cmp.<br>
Line 354 
Line 352 
 <p>  <p>
   
 <li id="p025_smtpd">  <li id="p025_smtpd">
 <font color="#009000"><strong>025: RELIABILITY FIX: April 17, 2015</strong></font>  <strong>025: RELIABILITY FIX: April 17, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a logic error in smtpd handling of SNI.  Fix a logic error in smtpd handling of SNI.
 This could allow a remote user to crash the server or provoke a disconnect of other sessions.  This could allow a remote user to crash the server or provoke a disconnect of other sessions.
Line 366 
Line 364 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.58  
changed lines
  Added in v.1.59