[BACK]Return to errata56.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata56.html between version 1.50 and 1.51

version 1.50, 2017/03/28 04:04:52 version 1.51, 2017/03/28 06:41:18
Line 71 
Line 71 
 <p>  <p>
 Patches for the OpenBSD base system are distributed as unified diffs.  Patches for the OpenBSD base system are distributed as unified diffs.
 Each patch is cryptographically signed with the  Each patch is cryptographically signed with the
 <a href="http://man.openbsd.org/signify">signify(1)</a> tool and contains  <a href="http://man.openbsd.org/OpenBSD-5.6/signify.1">signify(1)</a> tool and contains
 usage instructions.  usage instructions.
 All the following patches are also available in one  All the following patches are also available in one
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.6.tar.gz">tar.gz file</a>  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.6.tar.gz">tar.gz file</a>
Line 85 
Line 85 
   
 <ul>  <ul>
   
 <li id="001_rxr">  <li id="p001_rxr">
 <font color="#009000"><strong>001: RELIABILITY FIX: September 5, 2014</strong></font>  <font color="#009000"><strong>001: RELIABILITY FIX: September 5, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).  Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
Line 94 
Line 94 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="002_nd6">  <li id="p002_nd6">
 <font color="#009000"><strong>002: RELIABILITY FIX: October 1, 2014</strong></font>  <font color="#009000"><strong>002: RELIABILITY FIX: October 1, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,  If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,
Line 108 
Line 108 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="003_nginx">  <li id="p003_nginx">
 <font color="#009000"><strong>003: SECURITY FIX: October 1, 2014</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: October 1, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual  nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
Line 119 
Line 119 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="004_kernexec">  <li id="p004_kernexec">
 <font color="#009000"><strong>004: RELIABILITY FIX: October 20, 2014</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: October 20, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Executable headers with an unaligned address will trigger a kernel panic.  Executable headers with an unaligned address will trigger a kernel panic.
Line 128 
Line 128 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="005_nosslv3">  <li id="p005_nosslv3">
 <font color="#009000"><strong>005: SECURITY FIX: October 20, 2014</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: October 20, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 This patch disables the SSLv3 protocol by default.  This patch disables the SSLv3 protocol by default.
 <p>  <p>
 <i>  <i>
 Applications depending on SSLv3 may need to be recompiled with  Applications depending on SSLv3 may need to be recompiled with
   </i>
 <pre>    SSL_CTX_clear_option(ctx, SSL_OP_NO_SSLv3);</pre>  <pre>    SSL_CTX_clear_option(ctx, SSL_OP_NO_SSLv3);</pre>
   <i>
 but we recommend against the continued use of this obsolete protocol.  but we recommend against the continued use of this obsolete protocol.
 </i>  </i>
 <p>  <p>
Line 143 
Line 145 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="006_relayd">  <li id="p006_relayd">
 <font color="#009000"><strong>006: RELIABILITY FIX: November 17, 2014</strong></font>  <font color="#009000"><strong>006: RELIABILITY FIX: November 17, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Certain http requests can crash relayd.  Certain http requests can crash relayd.
Line 152 
Line 154 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="007_pfctl">  <li id="p007_pfctl">
 <font color="#009000"><strong>007: RELIABILITY FIX: November 17, 2014</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: November 17, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A PF rule using an IPv4 address  A PF rule using an IPv4 address
Line 164 
Line 166 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="008_asr">  <li id="p008_asr">
 <font color="#009000"><strong>008: RELIABILITY FIX: November 17, 2014</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: November 17, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.  Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
Line 173 
Line 175 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="009_httpd">  <li id="p009_httpd">
 <font color="#009000"><strong>009: RELIABILITY FIX: November 18, 2014</strong></font>  <font color="#009000"><strong>009: RELIABILITY FIX: November 18, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 httpd was developed very rapidly in the weeks before 5.6 release, and  httpd was developed very rapidly in the weeks before 5.6 release, and
Line 191 
Line 193 
 to use cvs to get the latest httpd sources if interested.</i>  to use cvs to get the latest httpd sources if interested.</i>
 <p>  <p>
   
 <li id="010_pipex">  <li id="p010_pipex">
 <font color="#009000"><strong>010: RELIABILITY FIX: December 5, 2014</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: December 5, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several bugs were fixed that allowed a crash from remote when an active pipex  Several bugs were fixed that allowed a crash from remote when an active pipex
Line 201 
Line 203 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="011_pppoe">  <li id="p011_pppoe">
 <font color="#009000"><strong>011: RELIABILITY FIX: December 5, 2014</strong></font>  <font color="#009000"><strong>011: RELIABILITY FIX: December 5, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An incorrect memcpy call would result in corrupted MAC addresses when  An incorrect memcpy call would result in corrupted MAC addresses when
Line 211 
Line 213 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="012_unbound">  <li id="p012_unbound">
 <font color="#009000"><strong>012: RELIABILITY FIX: December 9, 2014</strong></font>  <font color="#009000"><strong>012: RELIABILITY FIX: December 9, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a denial of service where a malicious authority could make the resolver chase an  Fix a denial of service where a malicious authority could make the resolver chase an
Line 221 
Line 223 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="013_virtio">  <li id="p013_virtio">
 <font color="#009000"><strong>013: RELIABILITY FIX: December 9, 2014</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: December 9, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Missing memory barriers in virtio(4) can lead to hangs with virtio devices,  Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
Line 231 
Line 233 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="014_xserver">  <li id="p014_xserver">
 <font color="#009000"><strong>014: SECURITY FIX: December 9, 2014</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: December 9, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 One year after Ilja van Sprundel discovered and reported a large number  One year after Ilja van Sprundel discovered and reported a large number
Line 244 
Line 246 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="015_libevent">  <li id="p015_libevent">
 <font color="#009000"><strong>015: SECURITY FIX: January 13, 2015</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: January 13, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD  Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD
Line 257 
Line 259 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="016_xserver">  <li id="p016_xserver">
 <font color="#009000"><strong>016: SECURITY FIX: March 3, 2015</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: March 3, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Information leak in the XkbSetGeometry request of X servers.  Information leak in the XkbSetGeometry request of X servers.
Line 269 
Line 271 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="017_openssl">  <li id="p017_openssl">
 <font color="#009000"><strong>017: SECURITY FIX: March 13, 2015</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: March 13, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Don't permit TLS client connections to be downgraded to weak keys.  Don't permit TLS client connections to be downgraded to weak keys.
Line 278 
Line 280 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="018_freetype">  <li id="p018_freetype">
 <font color="#009000"><strong>018: SECURITY FIX: March 13, 2015</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: March 13, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Another fix for buffer overflows in malformed fonts.  Another fix for buffer overflows in malformed fonts.
Line 287 
Line 289 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="019_libxfont">  <li id="p019_libxfont">
 <font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflows in libXfont  Buffer overflows in libXfont
Line 300 
Line 302 
 <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.  <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.
 <p>  <p>
   
 <li id="020_openssl">  <li id="p020_openssl">
 <font color="#009000"><strong>020: SECURITY FIX: March 19, 2015</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: March 19, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several crash causing defects from OpenSSL.<br>  Fix several crash causing defects from OpenSSL.<br>
Line 319 
Line 321 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="021_smtpd">  <li id="p021_smtpd">
 <font color="#009000"><strong>021: RELIABILITY FIX: April 17, 2015</strong></font>  <font color="#009000"><strong>021: RELIABILITY FIX: April 17, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a logic error in smtpd handling of SNI.  Fix a logic error in smtpd handling of SNI.
Line 329 
Line 331 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="022_httpd">  <li id="p022_httpd">
 <font color="#009000"><strong>022: RELIABILITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>022: RELIABILITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A remote user can crash httpd by forcing the daemon to log to a file  A remote user can crash httpd by forcing the daemon to log to a file
Line 339 
Line 341 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="023_elf">  <li id="p023_elf">
 <font color="#009000"><strong>023: SECURITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malformed binaries could trigger kernel panics or view kernel memory.  Malformed binaries could trigger kernel panics or view kernel memory.
Line 348 
Line 350 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="024_tar">  <li id="p024_tar">
 <font color="#009000"><strong>024: SECURITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple issues in tar/pax/cpio:  Multiple issues in tar/pax/cpio:
Line 363 
Line 365 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="025_smtpd">  <li id="p025_smtpd">
 <font color="#009000"><strong>025: RELIABILITY FIX: June 11, 2015</strong></font>  <font color="#009000"><strong>025: RELIABILITY FIX: June 11, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability issues in smtpd:  Fix multiple reliability issues in smtpd:
Line 375 
Line 377 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="026_openssl">  <li id="p026_openssl">
 <font color="#009000"><strong>026: SECURITY FIX: June 11, 2015</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: June 11, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several defects from OpenSSL:  Fix several defects from OpenSSL:
Line 393 
Line 395 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="027_tcp">  <li id="p027_tcp">
 <font color="#009000"><strong>027: SECURITY FIX: July 14, 2015</strong></font>  <font color="#009000"><strong>027: SECURITY FIX: July 14, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A TCP socket can become confused and not properly cleanup resources.  A TCP socket can become confused and not properly cleanup resources.
Line 402 
Line 404 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="028_execve">  <li id="p028_execve">
 <font color="#009000"><strong>028: RELIABILITY FIX: July 26, 2015</strong></font>  <font color="#009000"><strong>028: RELIABILITY FIX: July 26, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A kernel memory leak could be triggered by an unprivileged user in  A kernel memory leak could be triggered by an unprivileged user in
Line 412 
Line 414 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="029_patch">  <li id="p029_patch">
 <font color="#009000"><strong>029: SECURITY FIX: July 26, 2015</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: July 26, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could be made to invoke arbitrary commands via  The patch utility could be made to invoke arbitrary commands via
Line 423 
Line 425 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="030_patch">  <li id="p030_patch">
 <font color="#009000"><strong>030: SECURITY FIX: July 30, 2015</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: July 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could become desyncronized processing ed(1)-style diffs.  The patch utility could become desyncronized processing ed(1)-style diffs.
Line 432 
Line 434 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="031_smtpd">  <li id="p031_smtpd">
 <font color="#009000"><strong>031: SECURITY FIX: October 1, 2015</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: October 1, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability and security issues in smtpd:<br>  Fix multiple reliability and security issues in smtpd:<br>
Line 451 
Line 453 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="032_kevent">  <li id="p032_kevent">
 <font color="#009000"><strong>032: RELIABILITY FIX: October 14, 2015</strong></font>  <font color="#009000"><strong>032: RELIABILITY FIX: October 14, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem with timer kevents could result in a kernel hang (local denial  A problem with timer kevents could result in a kernel hang (local denial
Line 460 
Line 462 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="033_obj2txt">  <li id="p033_obj2txt">
 <font color="#009000"><strong>033: RELIABILITY FIX: October 15, 2015</strong></font>  <font color="#009000"><strong>033: RELIABILITY FIX: October 15, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun  The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun

Legend:
Removed from v.1.50  
changed lines
  Added in v.1.51