[BACK]Return to errata56.html CVS log [TXT][DIR] Up to [local] / www

Annotation of www/errata56.html, Revision 1.36

1.1       jsg         1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
                      2: <html>
                      3: <head>
                      4: <title>OpenBSD 5.6 errata</title>
                      5: <meta name="description" content="the OpenBSD CD errata page">
                      6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.30      sthen       7: <link rel="canonical" href="http://www.openbsd.org/errata56.html">
1.1       jsg         8: </head>
                      9:
                     10: <!--
                     11:                        IMPORTANT REMINDER
                     12:        IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
                     13: -->
                     14:
                     15: <body bgcolor="#ffffff" text="#000000" link="#23238E">
                     16:
                     17: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
1.3       deraadt    18: <h2><font color="#e00000">
                     19: OpenBSD 5.6 errata
1.1       jsg        20: </font></h2>
                     21:
                     22: <hr>
                     23: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
                     24: <br>
                     25: For errata on a certain release, click below:<br>
                     26: <a href="errata21.html">2.1</a>,
                     27: <a href="errata22.html">2.2</a>,
                     28: <a href="errata23.html">2.3</a>,
                     29: <a href="errata24.html">2.4</a>,
                     30: <a href="errata25.html">2.5</a>,
                     31: <a href="errata26.html">2.6</a>,
                     32: <a href="errata27.html">2.7</a>,
                     33: <a href="errata28.html">2.8</a>,
                     34: <a href="errata29.html">2.9</a>,
                     35: <a href="errata30.html">3.0</a>,
                     36: <a href="errata31.html">3.1</a>,
                     37: <a href="errata32.html">3.2</a>,
                     38: <a href="errata33.html">3.3</a>,
                     39: <a href="errata34.html">3.4</a>,
                     40: <a href="errata35.html">3.5</a>,
                     41: <a href="errata36.html">3.6</a>,
                     42: <br>
                     43: <a href="errata37.html">3.7</a>,
                     44: <a href="errata38.html">3.8</a>,
                     45: <a href="errata39.html">3.9</a>,
                     46: <a href="errata40.html">4.0</a>,
                     47: <a href="errata41.html">4.1</a>,
                     48: <a href="errata42.html">4.2</a>,
                     49: <a href="errata43.html">4.3</a>,
                     50: <a href="errata44.html">4.4</a>,
                     51: <a href="errata45.html">4.5</a>,
                     52: <a href="errata46.html">4.6</a>,
                     53: <a href="errata47.html">4.7</a>,
                     54: <a href="errata48.html">4.8</a>,
                     55: <a href="errata49.html">4.9</a>,
                     56: <a href="errata50.html">5.0</a>,
                     57: <a href="errata51.html">5.1</a>,
                     58: <a href="errata52.html">5.2</a>,
                     59: <br>
                     60: <a href="errata53.html">5.3</a>,
                     61: <a href="errata54.html">5.4</a>,
1.21      deraadt    62: <a href="errata55.html">5.5</a>,
                     63: <a href="errata57.html">5.7</a>.
1.1       jsg        64: <br>
                     65: <hr>
                     66:
                     67: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6.tar.gz">
                     68: You can also fetch a tar.gz file containing all the following patches</a>.
                     69: This file is updated once a day.
                     70: <p>
                     71:
                     72: The patches below are available in CVS via the
                     73: <code>OPENBSD_5_6</code> <a href="stable.html">patch branch</a>.
                     74: <p>
                     75:
                     76: For more detailed information on how to install patches to OpenBSD, please
                     77: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
                     78: <p>
                     79:
                     80: <hr>
                     81:
                     82: <ul>
                     83:
1.16      bentley    84: <li id="001_rxr">
1.1       jsg        85: <font color="#009000"><strong>001: RELIABILITY FIX: September 5, 2014</strong></font>
                     86: &nbsp; <i>All architectures</i><br>
                     87: Incorrect RX ring computation leads to panics under load with bge(4), em(4) and ix(4).
                     88: <br>
1.2       stsp       89: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/001_rxr.patch.sig">
                     90: A source code patch exists which remedies this problem.</a>
                     91: <p>
                     92:
1.16      bentley    93: <li id="002_nd6">
1.2       stsp       94: <font color="#009000"><strong>002: RELIABILITY FIX: October 1, 2014</strong></font>
                     95: &nbsp; <i>All architectures</i><br>
                     96: If IPv6 autoconf is active on an interface and the autoconfprivacy extension is used,
                     97: redundant addresses are added whenever an autoconfprivacy address expires.
                     98: The autoconfprivacy extension is used by default and can be disabled with ifconfig(8)
                     99: as a workaround:
                    100: <pre>
                    101: # ifconfig em0 -autoconfprivacy
                    102: </pre>
                    103: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/002_nd6.patch.sig">
                    104: A source code patch exists which remedies this problem.</a>
                    105: <p>
                    106:
1.16      bentley   107: <li id="003_nginx">
1.2       stsp      108: <font color="#009000"><strong>003: SECURITY FIX: October 1, 2014</strong></font>
                    109: &nbsp; <i>All architectures</i><br>
                    110: nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
                    111: host confusion attacks in some configurations.
                    112: This issue was assigned CVE-2014-3616.
                    113: <br>
                    114: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/003_nginx.patch.sig">
1.1       jsg       115: A source code patch exists which remedies this problem.</a>
                    116: <p>
                    117:
1.16      bentley   118: <li id="004_kernexec">
1.4       tedu      119: <font color="#009000"><strong>004: RELIABILITY FIX: October 20, 2014</strong></font>
                    120: &nbsp; <i>All architectures</i><br>
                    121: Executable headers with an unaligned address will trigger a kernel panic.
                    122: <br>
                    123: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/004_kernexec.patch.sig">
                    124: A source code patch exists which remedies this problem.</a>
                    125: <p>
                    126:
1.16      bentley   127: <li id="005_nosslv3">
1.5       tedu      128: <font color="#009000"><strong>005: SECURITY FIX: October 20, 2014</strong></font>
                    129: &nbsp; <i>All architectures</i><br>
                    130: This patch disables the SSLv3 protocol by default.
                    131: <p>
                    132: <i>
                    133: Applications depending on SSLv3 may need to be recompiled with
                    134: <pre>    SSL_CTX_clear_option(ctx, SSL_OP_NO_SSLv3);</pre>
                    135: but we recommend against the continued use of this obsolete protocol.
                    136: </i>
                    137: <p>
                    138: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/005_nosslv3.patch.sig">
                    139: A source code patch exists which remedies this problem.</a>
                    140: <p>
                    141:
1.16      bentley   142: <li id="006_relayd">
1.6       florian   143: <font color="#009000"><strong>006: RELIABILITY FIX: November 17, 2014</strong></font>
                    144: &nbsp; <i>All architectures</i><br>
                    145: Certain http requests can crash relayd.
                    146: <br>
                    147: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/006_relayd.patch.sig">
                    148: A source code patch exists which remedies this problem.</a>
                    149: <p>
                    150:
1.16      bentley   151: <li id="007_pfctl">
1.8       tedu      152: <font color="#009000"><strong>007: RELIABILITY FIX: November 17, 2014</strong></font>
1.7       sthen     153: &nbsp; <i>All architectures</i><br>
1.8       tedu      154: A PF rule using an IPv4 address
                    155: followed by an IPv6 address and then a dynamic address, e.g. "pass
                    156: from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32
                    157: mask applied to the dynamic address.
1.7       sthen     158: <br>
                    159: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/007_pfctl.patch.sig">
1.8       tedu      160: A source code patch exists which remedies this problem.</a>
                    161: <p>
                    162:
1.16      bentley   163: <li id="008_asr">
1.8       tedu      164: <font color="#009000"><strong>008: RELIABILITY FIX: November 17, 2014</strong></font>
                    165: &nbsp; <i>All architectures</i><br>
                    166: Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
                    167: <br>
                    168: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/008_asr.patch.sig">
1.7       sthen     169: A source code patch exists which remedies this problem.</a>
                    170: <p>
                    171:
1.16      bentley   172: <li id="009_httpd">
1.9       reyk      173: <font color="#009000"><strong>009: RELIABILITY FIX: November 18, 2014</strong></font>
                    174: &nbsp; <i>All architectures</i><br>
                    175: httpd was developed very rapidly in the weeks before 5.6 release, and
                    176: it has a few flaws.  It would be nice to get these flaws fully
                    177: remediated before the next release, and that requires the community to
                    178: want to use it.  Therefore here is a "jumbo" patch that brings in the
                    179: most important fixes.
                    180: <br>
                    181: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig">
                    182: A source code patch exists which remedies this problem.</a>
1.19      tedu      183: <br>
                    184: <i>Unfortunately the source tree found on the CD set contains a slightly different
                    185: checkout, from just before the release was finished and is missing a few httpd
                    186: commits. Therefore, the patch above will not apply correctly. Users are encouraged
                    187: to use cvs to get the latest httpd sources if interested.</i>
1.9       reyk      188: <p>
                    189:
1.16      bentley   190: <li id="010_pipex">
1.10      tedu      191: <font color="#009000"><strong>010: RELIABILITY FIX: December 5, 2014</strong></font>
                    192: &nbsp; <i>All architectures</i><br>
                    193: Several bugs were fixed that allowed a crash from remote when an active pipex
                    194: session exists.
                    195: <br>
                    196: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/010_pipex.patch.sig">
                    197: A source code patch exists which remedies this problem.</a>
                    198: <p>
                    199:
1.16      bentley   200: <li id="011_pppoe">
1.11      tedu      201: <font color="#009000"><strong>011: RELIABILITY FIX: December 5, 2014</strong></font>
1.10      tedu      202: &nbsp; <i>All architectures</i><br>
                    203: An incorrect memcpy call would result in corrupted MAC addresses when
                    204: using PPPOE.
                    205: <br>
                    206: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/011_pppoe.patch.sig">
                    207: A source code patch exists which remedies this problem.</a>
                    208: <p>
                    209:
1.16      bentley   210: <li id="012_unbound">
1.14      tedu      211: <font color="#009000"><strong>012: RELIABILITY FIX: December 9, 2014</strong></font>
1.12      tedu      212: &nbsp; <i>All architectures</i><br>
1.13      tedu      213: Fix a denial of service where a malicious authority could make the resolver chase an
                    214: endless series of delegations. (CVE-2014-8602)
1.12      tedu      215: <br>
1.13      tedu      216: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/012_unbound.patch.sig">
1.12      tedu      217: A source code patch exists which remedies this problem.</a>
                    218: <p>
                    219:
1.16      bentley   220: <li id="013_virtio">
1.14      tedu      221: <font color="#009000"><strong>013: RELIABILITY FIX: December 9, 2014</strong></font>
1.12      tedu      222: &nbsp; <i>All architectures</i><br>
1.13      tedu      223: Missing memory barriers in virtio(4) can lead to hangs with virtio devices,
                    224: like vio(4) and vioblk(4).
1.12      tedu      225: <br>
1.13      tedu      226: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/013_virtio.patch.sig">
1.12      tedu      227: A source code patch exists which remedies this problem.</a>
                    228: <p>
                    229:
1.16      bentley   230: <li id="014_xserver">
1.14      tedu      231: <font color="#009000"><strong>014: SECURITY FIX: December 9, 2014</strong></font>
1.12      tedu      232: &nbsp; <i>All architectures</i><br>
                    233: One year after Ilja van Sprundel discovered and reported a large number
                    234: of issues in the way the X server code base handles requests from X clients,
                    235: they have been fixed.
                    236: <br>
                    237: <a href="http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/">X Advisory</a>
                    238: <br>
                    239: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/014_xserver.patch.sig">
                    240: A source code patch exists which remedies this problem.</a>
                    241: <p>
                    242:
1.16      bentley   243: <li id="015_libevent">
1.15      bluhm     244: <font color="#009000"><strong>015: SECURITY FIX: January 13, 2015</strong></font>
                    245: &nbsp; <i>All architectures</i><br>
                    246: Fix CVE-2014-6272 in libevent 1.4 event buffer handling.  OpenBSD
                    247: base uses it for the programs: cu tmux ftp-proxy httpd ldapd relayd
                    248: tftp-proxy tftpd
                    249: <br>
                    250: <a href="http://www.wangafu.net/~nickm/volatile/advisory.txt.asc">Libevent Advisory</a>
                    251: <br>
                    252: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/015_libevent.patch.sig">
                    253: A source code patch exists which remedies this problem.</a>
                    254: <p>
1.10      tedu      255:
1.17      tedu      256: <li id="016_xserver">
                    257: <font color="#009000"><strong>016: SECURITY FIX: March 3, 2015</strong></font>
                    258: &nbsp; <i>All architectures</i><br>
                    259: Information leak in the XkbSetGeometry request of X servers.
                    260: <br>
                    261: For more information, see the
                    262: <a href="http://www.x.org/wiki/Development/Security/Advisory-2015-02-10/">X.org advisory</a>.
                    263: <br>
                    264: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/016_xserver.patch.sig">
                    265: A source code patch exists which remedies this problem.</a>
                    266: <p>
                    267:
1.20      tedu      268: <li id="017_openssl">
                    269: <font color="#009000"><strong>017: SECURITY FIX: March 13, 2015</strong></font>
                    270: &nbsp; <i>All architectures</i><br>
                    271: Don't permit TLS client connections to be downgraded to weak keys.
                    272: <br>
                    273: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/017_openssl.patch.sig">
                    274: A source code patch exists which remedies this problem.</a>
                    275: <p>
                    276:
                    277: <li id="018_freetype">
                    278: <font color="#009000"><strong>018: SECURITY FIX: March 13, 2015</strong></font>
                    279: &nbsp; <i>All architectures</i><br>
                    280: Another fix for buffer overflows in malformed fonts.
                    281: <br>
                    282: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/018_freetype.patch.sig">
                    283: A source code patch exists which remedies this problem.</a>
                    284: <p>
                    285:
1.23      tedu      286: <li id="019_libxfont">
1.22      tedu      287: <font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font>
                    288: &nbsp; <i>All architectures</i><br>
                    289: Buffer overflows in libXfont
                    290: <br>
                    291: For more information, see the
                    292: <a href="http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/">X.org advisory</a>.
                    293: <br>
                    294: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/019_libxfont.patch.sig">
1.23      tedu      295: A source code patch exists which remedies this problem.</a>
1.24      tedu      296: <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.
1.23      tedu      297: <p>
                    298:
                    299: <li id="020_openssl">
                    300: <font color="#009000"><strong>020: SECURITY FIX: March 19, 2015</strong></font>
                    301: &nbsp; <i>All architectures</i><br>
                    302: Fix several crash causing defects from OpenSSL.<br>
                    303: These include:<br>
                    304: CVE-2015-0209 - Use After Free following d2i_ECPrivatekey error<br>
                    305: CVE-2015-0286 - Segmentation fault in ASN1_TYPE_cmp<br>
                    306: CVE-2015-0287 - ASN.1 structure reuse memory corruption<br>
                    307: CVE-2015-0288 - X509_to_X509_REQ NULL pointer deref<br>
                    308: CVE-2015-0289 - PKCS7 NULL pointer dereferences<br>
                    309: <br>
                    310: Several other issues did not apply or were already fixed.<br>
                    311: For more information, see the
                    312: <a href="https://www.openssl.org/news/secadv_20150319.txt">OpenSSL advisory</a>.
                    313: <br>
                    314: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/020_openssl.patch.sig">
1.22      tedu      315: A source code patch exists which remedies this problem.</a>
                    316: <p>
                    317:
1.25      gilles    318: <li id="021_smtpd">
                    319: <font color="#009000"><strong>021: RELIABILITY FIX: April 17, 2015</strong></font>
                    320: &nbsp; <i>All architectures</i><br>
                    321: Fix a logic error in smtpd handling of SNI.
                    322: This could allow a remote user to crash the server or provoke a disconnect of other sessions.
                    323: <br>
                    324: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/021_smtpd.patch.sig">
1.28      deraadt   325: A source code patch exists which remedies this problem.</a>
1.25      gilles    326: <p>
                    327:
1.26      florian   328: <li id="022_httpd">
                    329: <font color="#009000"><strong>022: RELIABILITY FIX: April 30, 2015</strong></font>
                    330: &nbsp; <i>All architectures</i><br>
                    331: A remote user can crash httpd by forcing the daemon to log to a file
                    332: before the logging system was initialized.
                    333: <br>
                    334: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/022_httpd.patch.sig">
1.28      deraadt   335: A source code patch exists which remedies this problem.</a>
1.26      florian   336: <p>
                    337:
1.27      guenther  338: <li id="023_elf">
1.29      deraadt   339: <font color="#009000"><strong>023: SECURITY FIX: April 30, 2015</strong></font>
1.27      guenther  340: &nbsp; <i>All architectures</i><br>
                    341: Malformed binaries could trigger kernel panics or view kernel memory.
                    342: <br>
                    343: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/023_elf.patch.sig">
1.28      deraadt   344: A source code patch exists which remedies this problem.</a>
1.27      guenther  345: <p>
                    346:
                    347: <li id="024_tar">
1.29      deraadt   348: <font color="#009000"><strong>024: SECURITY FIX: April 30, 2015</strong></font>
1.27      guenther  349: &nbsp; <i>All architectures</i><br>
                    350: Multiple issues in tar/pax/cpio:
                    351: <ul>
                    352: <li>extracting a malicious archive could create files outside of
                    353: the current directory without using pre-existing symlinks to 'escape',
                    354: and could change the timestamps and modes on preexisting files
                    355: <li>tar without -P would permit extraction of paths with ".." components
                    356: <li>there was a buffer overflow in the handling of pax extension headers
                    357: </ul>
                    358: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/024_tar.patch.sig">
1.31      deraadt   359: A source code patch exists which remedies this problem.</a>
                    360: <p>
                    361:
                    362: <li id="025_smtpd">
                    363: <font color="#009000"><strong>025: RELIABILITY FIX: June 11, 2015</strong></font>
                    364: &nbsp; <i>All architectures</i><br>
                    365: Fix multiple reliability issues in smtpd:
                    366: <ul>
                    367: <li>a local user can cause smtpd to fail by writing an invalid imsg to control socket.
                    368: <li>a local user can prevent smtpd from serving new requests by exhausting descriptors.
                    369: </ul>
                    370: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/025_smtpd.patch.sig">
                    371: A source code patch exists which remedies this problem.</a>
                    372: <p>
                    373:
                    374: <li id="026_openssl">
                    375: <font color="#009000"><strong>026: SECURITY FIX: June 11, 2015</strong></font>
                    376: &nbsp; <i>All architectures</i><br>
                    377: Fix several defects from OpenSSL:
                    378: <ul>
                    379: <li>CVE-2015-1788 - Malformed ECParameters causes infinite loop
                    380: <li>CVE-2015-1789 - Exploitable out-of-bounds read in X509_cmp_time
                    381: <li>CVE-2015-1792 - CMS verify infinite loop with unknown hash function
                    382: </ul>
1.32      doug      383: Note that CMS was already disabled in LibreSSL.
                    384: Several other issues did not apply or were already fixed and one is under review.<br>
                    385: For more information, see the
                    386: <a href="https://www.openssl.org/news/secadv_20150611.txt">OpenSSL advisory</a>.
                    387: <br>
1.31      deraadt   388: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/026_openssl.patch.sig">
1.28      deraadt   389: A source code patch exists which remedies this problem.</a>
1.27      guenther  390: <p>
                    391:
1.34      deraadt   392: <li id="026_tcp">
                    393: <font color="#009000"><strong>027: SECURITY FIX: July 14, 2015</strong></font>
                    394: &nbsp; <i>All architectures</i><br>
                    395: A TCP socket can become confused and not properly cleanup resources.
                    396: <br>
1.36    ! deraadt   397: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/027_tcp_persist.patch.sig">
1.34      deraadt   398: A source code patch exists which remedies this problem.</a>
                    399: <p>
                    400:
1.1       jsg       401: </ul>
                    402:
1.18      tedu      403: <hr>
                    404:
1.1       jsg       405: </body>
                    406: </html>