[BACK]Return to errata56.html CVS log [TXT][DIR] Up to [local] / www

Annotation of www/errata56.html, Revision 1.32

1.1       jsg         1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
                      2: <html>
                      3: <head>
                      4: <title>OpenBSD 5.6 errata</title>
                      5: <meta name="resource-type" content="document">
                      6: <meta name="description" content="the OpenBSD CD errata page">
                      7: <meta name="keywords" content="openbsd,cd,errata">
                      8: <meta name="distribution" content="global">
                      9: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.30      sthen      10: <link rel="canonical" href="http://www.openbsd.org/errata56.html">
1.1       jsg        11: </head>
                     12:
                     13: <!--
                     14:                        IMPORTANT REMINDER
                     15:        IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
                     16: -->
                     17:
                     18: <body bgcolor="#ffffff" text="#000000" link="#23238E">
                     19:
                     20: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
1.3       deraadt    21: <h2><font color="#e00000">
                     22: OpenBSD 5.6 errata
1.1       jsg        23: </font></h2>
                     24:
                     25: <hr>
                     26: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
                     27: <br>
                     28: For errata on a certain release, click below:<br>
                     29: <a href="errata21.html">2.1</a>,
                     30: <a href="errata22.html">2.2</a>,
                     31: <a href="errata23.html">2.3</a>,
                     32: <a href="errata24.html">2.4</a>,
                     33: <a href="errata25.html">2.5</a>,
                     34: <a href="errata26.html">2.6</a>,
                     35: <a href="errata27.html">2.7</a>,
                     36: <a href="errata28.html">2.8</a>,
                     37: <a href="errata29.html">2.9</a>,
                     38: <a href="errata30.html">3.0</a>,
                     39: <a href="errata31.html">3.1</a>,
                     40: <a href="errata32.html">3.2</a>,
                     41: <a href="errata33.html">3.3</a>,
                     42: <a href="errata34.html">3.4</a>,
                     43: <a href="errata35.html">3.5</a>,
                     44: <a href="errata36.html">3.6</a>,
                     45: <br>
                     46: <a href="errata37.html">3.7</a>,
                     47: <a href="errata38.html">3.8</a>,
                     48: <a href="errata39.html">3.9</a>,
                     49: <a href="errata40.html">4.0</a>,
                     50: <a href="errata41.html">4.1</a>,
                     51: <a href="errata42.html">4.2</a>,
                     52: <a href="errata43.html">4.3</a>,
                     53: <a href="errata44.html">4.4</a>,
                     54: <a href="errata45.html">4.5</a>,
                     55: <a href="errata46.html">4.6</a>,
                     56: <a href="errata47.html">4.7</a>,
                     57: <a href="errata48.html">4.8</a>,
                     58: <a href="errata49.html">4.9</a>,
                     59: <a href="errata50.html">5.0</a>,
                     60: <a href="errata51.html">5.1</a>,
                     61: <a href="errata52.html">5.2</a>,
                     62: <br>
                     63: <a href="errata53.html">5.3</a>,
                     64: <a href="errata54.html">5.4</a>,
1.21      deraadt    65: <a href="errata55.html">5.5</a>,
                     66: <a href="errata57.html">5.7</a>.
1.1       jsg        67: <br>
                     68: <hr>
                     69:
                     70: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6.tar.gz">
                     71: You can also fetch a tar.gz file containing all the following patches</a>.
                     72: This file is updated once a day.
                     73: <p>
                     74:
                     75: The patches below are available in CVS via the
                     76: <code>OPENBSD_5_6</code> <a href="stable.html">patch branch</a>.
                     77: <p>
                     78:
                     79: For more detailed information on how to install patches to OpenBSD, please
                     80: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
                     81: <p>
                     82:
                     83: <hr>
                     84:
                     85: <ul>
                     86:
1.16      bentley    87: <li id="001_rxr">
1.1       jsg        88: <font color="#009000"><strong>001: RELIABILITY FIX: September 5, 2014</strong></font>
                     89: &nbsp; <i>All architectures</i><br>
                     90: Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
                     91: <br>
1.2       stsp       92: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/001_rxr.patch.sig">
                     93: A source code patch exists which remedies this problem.</a>
                     94: <p>
                     95:
1.16      bentley    96: <li id="002_nd6">
1.2       stsp       97: <font color="#009000"><strong>002: RELIABILITY FIX: October 1, 2014</strong></font>
                     98: &nbsp; <i>All architectures</i><br>
                     99: If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,
                    100: redundant addresses are added whenever an autoconfprivacy address expires.
                    101: The autoconfprivacy extension is used by default and can be disabled with ifconfig(8)
                    102: as a workaround:
                    103: <pre>
                    104: # ifconfig em0 -autoconfprivacy
                    105: </pre>
                    106: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/002_nd6.patch.sig">
                    107: A source code patch exists which remedies this problem.</a>
                    108: <p>
                    109:
1.16      bentley   110: <li id="003_nginx">
1.2       stsp      111: <font color="#009000"><strong>003: SECURITY FIX: October 1, 2014</strong></font>
                    112: &nbsp; <i>All architectures</i><br>
                    113: nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
                    114: host confusion attacks in some configurations.
                    115: This issue was assigned CVE-2014-3616.
                    116: <br>
                    117: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/003_nginx.patch.sig">
1.1       jsg       118: A source code patch exists which remedies this problem.</a>
                    119: <p>
                    120:
1.16      bentley   121: <li id="004_kernexec">
1.4       tedu      122: <font color="#009000"><strong>004: RELIABILITY FIX: October 20, 2014</strong></font>
                    123: &nbsp; <i>All architectures</i><br>
                    124: Executable headers with an unaligned address will trigger a kernel panic.
                    125: <br>
                    126: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/004_kernexec.patch.sig">
                    127: A source code patch exists which remedies this problem.</a>
                    128: <p>
                    129:
1.16      bentley   130: <li id="005_nosslv3">
1.5       tedu      131: <font color="#009000"><strong>005: SECURITY FIX: October 20, 2014</strong></font>
                    132: &nbsp; <i>All architectures</i><br>
                    133: This patch disables the SSLv3 protocol by default.
                    134: <p>
                    135: <i>
                    136: Applications depending on SSLv3 may need to be recompiled with
                    137: <pre>    SSL_CTX_clear_option(ctx, SSL_OP_NO_SSLv3);</pre>
                    138: but we recommend against the continued use of this obsolete protocol.
                    139: </i>
                    140: <p>
                    141: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/005_nosslv3.patch.sig">
                    142: A source code patch exists which remedies this problem.</a>
                    143: <p>
                    144:
1.16      bentley   145: <li id="006_relayd">
1.6       florian   146: <font color="#009000"><strong>006: RELIABILITY FIX: November 17, 2014</strong></font>
                    147: &nbsp; <i>All architectures</i><br>
                    148: Certain http requests can crash relayd.
                    149: <br>
                    150: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/006_relayd.patch.sig">
                    151: A source code patch exists which remedies this problem.</a>
                    152: <p>
                    153:
1.16      bentley   154: <li id="007_pfctl">
1.8       tedu      155: <font color="#009000"><strong>007: RELIABILITY FIX: November 17, 2014</strong></font>
1.7       sthen     156: &nbsp; <i>All architectures</i><br>
1.8       tedu      157: A PF rule using an IPv4 address
                    158: followed by an IPv6 address and then a dynamic address, e.g. "pass
                    159: from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32
                    160: mask applied to the dynamic address.
1.7       sthen     161: <br>
                    162: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/007_pfctl.patch.sig">
1.8       tedu      163: A source code patch exists which remedies this problem.</a>
                    164: <p>
                    165:
1.16      bentley   166: <li id="008_asr">
1.8       tedu      167: <font color="#009000"><strong>008: RELIABILITY FIX: November 17, 2014</strong></font>
                    168: &nbsp; <i>All architectures</i><br>
                    169: Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
                    170: <br>
                    171: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/008_asr.patch.sig">
1.7       sthen     172: A source code patch exists which remedies this problem.</a>
                    173: <p>
                    174:
1.16      bentley   175: <li id="009_httpd">
1.9       reyk      176: <font color="#009000"><strong>009: RELIABILITY FIX: November 18, 2014</strong></font>
                    177: &nbsp; <i>All architectures</i><br>
                    178: httpd was developed very rapidly in the weeks before 5.6 release, and
                    179: it has a few flaws.  It would be nice to get these flaws fully
                    180: remediated before the next release, and that requires the community to
                    181: want to use it.  Therefore here is a "jumbo" patch that brings in the
                    182: most important fixes.
                    183: <br>
                    184: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig">
                    185: A source code patch exists which remedies this problem.</a>
1.19      tedu      186: <br>
                    187: <i>Unfortunately the source tree found on the CD set contains a slightly different
                    188: checkout, from just before the release was finished and is missing a few httpd
                    189: commits. Therefore, the patch above will not apply correctly. Users are encouraged
                    190: to use cvs to get the latest httpd sources if interested.</i>
1.9       reyk      191: <p>
                    192:
1.16      bentley   193: <li id="010_pipex">
1.10      tedu      194: <font color="#009000"><strong>010: RELIABILITY FIX: December 5, 2014</strong></font>
                    195: &nbsp; <i>All architectures</i><br>
                    196: Several bugs were fixed that allowed a crash from remote when an active pipex
                    197: session exists.
                    198: <br>
                    199: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/010_pipex.patch.sig">
                    200: A source code patch exists which remedies this problem.</a>
                    201: <p>
                    202:
1.16      bentley   203: <li id="011_pppoe">
1.11      tedu      204: <font color="#009000"><strong>011: RELIABILITY FIX: December 5, 2014</strong></font>
1.10      tedu      205: &nbsp; <i>All architectures</i><br>
                    206: An incorrect memcpy call would result in corrupted MAC addresses when
                    207: using PPPOE.
                    208: <br>
                    209: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/011_pppoe.patch.sig">
                    210: A source code patch exists which remedies this problem.</a>
                    211: <p>
                    212:
1.16      bentley   213: <li id="012_unbound">
1.14      tedu      214: <font color="#009000"><strong>012: RELIABILITY FIX: December 9, 2014</strong></font>
1.12      tedu      215: &nbsp; <i>All architectures</i><br>
1.13      tedu      216: Fix a denial of service where a malicious authority could make the resolver chase an
                    217: endless series of delegations. (CVE-2014-8602)
1.12      tedu      218: <br>
1.13      tedu      219: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/012_unbound.patch.sig">
1.12      tedu      220: A source code patch exists which remedies this problem.</a>
                    221: <p>
                    222:
1.16      bentley   223: <li id="013_virtio">
1.14      tedu      224: <font color="#009000"><strong>013: RELIABILITY FIX: December 9, 2014</strong></font>
1.12      tedu      225: &nbsp; <i>All architectures</i><br>
1.13      tedu      226: Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
                    227: like vio(4) and vioblk(4).
1.12      tedu      228: <br>
1.13      tedu      229: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/013_virtio.patch.sig">
1.12      tedu      230: A source code patch exists which remedies this problem.</a>
                    231: <p>
                    232:
1.16      bentley   233: <li id="014_xserver">
1.14      tedu      234: <font color="#009000"><strong>014: SECURITY FIX: December 9, 2014</strong></font>
1.12      tedu      235: &nbsp; <i>All architectures</i><br>
                    236: One year after Ilja van Sprundel discovered and reported a large number
                    237: of issues in the way the X server code base handles requests from X clients,
                    238: they have been fixed.
                    239: <br>
                    240: <a href="http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/">X Advisory</a>
                    241: <br>
                    242: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/014_xserver.patch.sig">
                    243: A source code patch exists which remedies this problem.</a>
                    244: <p>
                    245:
1.16      bentley   246: <li id="015_libevent">
1.15      bluhm     247: <font color="#009000"><strong>015: SECURITY FIX: January 13, 2015</strong></font>
                    248: &nbsp; <i>All architectures</i><br>
                    249: Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD
                    250: base uses it for the programs: cu tmux ftp-proxy httpd ldapd relayd
                    251: tftp-proxy tftpd
                    252: <br>
                    253: <a href="http://www.wangafu.net/~nickm/volatile/advisory.txt.asc">Libevent Advisory</a>
                    254: <br>
                    255: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/015_libevent.patch.sig">
                    256: A source code patch exists which remedies this problem.</a>
                    257: <p>
1.10      tedu      258:
1.17      tedu      259: <li id="016_xserver">
                    260: <font color="#009000"><strong>016: SECURITY FIX: March 3, 2015</strong></font>
                    261: &nbsp; <i>All architectures</i><br>
                    262: Information leak in the XkbSetGeometry request of X servers.
                    263: <br>
                    264: For more information, see the
                    265: <a href="http://www.x.org/wiki/Development/Security/Advisory-2015-02-10/">X.org advisory</a>.
                    266: <br>
                    267: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/016_xserver.patch.sig">
                    268: A source code patch exists which remedies this problem.</a>
                    269: <p>
                    270:
1.20      tedu      271: <li id="017_openssl">
                    272: <font color="#009000"><strong>017: SECURITY FIX: March 13, 2015</strong></font>
                    273: &nbsp; <i>All architectures</i><br>
                    274: Don't permit TLS client connections to be downgraded to weak keys.
                    275: <br>
                    276: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/017_openssl.patch.sig">
                    277: A source code patch exists which remedies this problem.</a>
                    278: <p>
                    279:
                    280: <li id="018_freetype">
                    281: <font color="#009000"><strong>018: SECURITY FIX: March 13, 2015</strong></font>
                    282: &nbsp; <i>All architectures</i><br>
                    283: Another fix for buffer overflows in malformed fonts.
                    284: <br>
                    285: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/018_freetype.patch.sig">
                    286: A source code patch exists which remedies this problem.</a>
                    287: <p>
                    288:
1.23      tedu      289: <li id="019_libxfont">
1.22      tedu      290: <font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font>
                    291: &nbsp; <i>All architectures</i><br>
                    292: Buffer overflows in libXfont
                    293: <br>
                    294: For more information, see the
                    295: <a href="http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/">X.org advisory</a>.
                    296: <br>
                    297: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/019_libxfont.patch.sig">
1.23      tedu      298: A source code patch exists which remedies this problem.</a>
1.24      tedu      299: <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.
1.23      tedu      300: <p>
                    301:
                    302: <li id="020_openssl">
                    303: <font color="#009000"><strong>020: SECURITY FIX: March 19, 2015</strong></font>
                    304: &nbsp; <i>All architectures</i><br>
                    305: Fix several crash causing defects from OpenSSL.<br>
                    306: These include:<br>
                    307: CVE-2015-0209 - Use After Free following d2i_ECPrivatekey error<br>
                    308: CVE-2015-0286 - Segmentation fault in ASN1_TYPE_cmp<br>
                    309: CVE-2015-0287 - ASN.1 structure reuse memory corruption<br>
                    310: CVE-2015-0288 - X509_to_X509_REQ NULL pointer deref<br>
                    311: CVE-2015-0289 - PKCS7 NULL pointer dereferences<br>
                    312: <br>
                    313: Several other issues did not apply or were already fixed.<br>
                    314: For more information, see the
                    315: <a href="https://www.openssl.org/news/secadv_20150319.txt">OpenSSL advisory</a>.
                    316: <br>
                    317: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/020_openssl.patch.sig">
1.22      tedu      318: A source code patch exists which remedies this problem.</a>
                    319: <p>
                    320:
1.25      gilles    321: <li id="021_smtpd">
                    322: <font color="#009000"><strong>021: RELIABILITY FIX: April 17, 2015</strong></font>
                    323: &nbsp; <i>All architectures</i><br>
                    324: Fix a logic error in smtpd handling of SNI.
                    325: This could allow a remote user to crash the server or provoke a disconnect of other sessions.
                    326: <br>
                    327: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/021_smtpd.patch.sig">
1.28      deraadt   328: A source code patch exists which remedies this problem.</a>
1.25      gilles    329: <p>
                    330:
1.26      florian   331: <li id="022_httpd">
                    332: <font color="#009000"><strong>022: RELIABILITY FIX: April 30, 2015</strong></font>
                    333: &nbsp; <i>All architectures</i><br>
                    334: A remote user can crash httpd by forcing the daemon to log to a file
                    335: before the logging system was initialized.
                    336: <br>
                    337: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/022_httpd.patch.sig">
1.28      deraadt   338: A source code patch exists which remedies this problem.</a>
1.26      florian   339: <p>
                    340:
1.27      guenther  341: <li id="023_elf">
1.29      deraadt   342: <font color="#009000"><strong>023: SECURITY FIX: April 30, 2015</strong></font>
1.27      guenther  343: &nbsp; <i>All architectures</i><br>
                    344: Malformed binaries could trigger kernel panics or view kernel memory.
                    345: <br>
                    346: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/023_elf.patch.sig">
1.28      deraadt   347: A source code patch exists which remedies this problem.</a>
1.27      guenther  348: <p>
                    349:
                    350: <li id="024_tar">
1.29      deraadt   351: <font color="#009000"><strong>024: SECURITY FIX: April 30, 2015</strong></font>
1.27      guenther  352: &nbsp; <i>All architectures</i><br>
                    353: Multiple issues in tar/pax/cpio:
                    354: <ul>
                    355: <li>extracting a malicious archive could create files outside of
                    356: the current directory without using pre-existing symlinks to 'escape',
                    357: and could change the timestamps and modes on preexisting files
                    358: <li>tar without -P would permit extraction of paths with ".." components
                    359: <li>there was a buffer overflow in the handling of pax extension headers
                    360: </ul>
                    361: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/024_tar.patch.sig">
1.31      deraadt   362: A source code patch exists which remedies this problem.</a>
                    363: <p>
                    364:
                    365: <li id="025_smtpd">
                    366: <font color="#009000"><strong>025: RELIABILITY FIX: June 11, 2015</strong></font>
                    367: &nbsp; <i>All architectures</i><br>
                    368: Fix multiple reliability issues in smtpd:
                    369: <ul>
                    370: <li>a local user can cause smtpd to fail by writing an invalid imsg to control socket.
                    371: <li>a local user can prevent smtpd from serving new requests by exhausting descriptors.
                    372: </ul>
                    373: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/025_smtpd.patch.sig">
                    374: A source code patch exists which remedies this problem.</a>
                    375: <p>
                    376:
                    377: <li id="026_openssl">
                    378: <font color="#009000"><strong>026: SECURITY FIX: June 11, 2015</strong></font>
                    379: &nbsp; <i>All architectures</i><br>
                    380: Fix several defects from OpenSSL:
                    381: <ul>
                    382: <li>CVE-2015-1788 - Malformed ECParameters causes infinite loop
                    383: <li>CVE-2015-1789 - Exploitable out-of-bounds read in X509_cmp_time
                    384: <li>CVE-2015-1792 - CMS verify infinite loop with unknown hash function
                    385: </ul>
1.32    ! doug      386: Note that CMS was already disabled in LibreSSL.
        !           387: Several other issues did not apply or were already fixed and one is under review.<br>
        !           388: For more information, see the
        !           389: <a href="https://www.openssl.org/news/secadv_20150611.txt">OpenSSL advisory</a>.
        !           390: <br>
1.31      deraadt   391: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/026_openssl.patch.sig">
1.28      deraadt   392: A source code patch exists which remedies this problem.</a>
1.27      guenther  393: <p>
                    394:
1.1       jsg       395: </ul>
                    396:
1.18      tedu      397: <hr>
                    398:
1.1       jsg       399: </body>
                    400: </html>