[BACK]Return to errata57.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata57.html between version 1.44 and 1.45

version 1.44, 2017/03/28 04:04:52 version 1.45, 2017/03/28 06:41:18
Line 71 
Line 71 
 <p>  <p>
 Patches for the OpenBSD base system are distributed as unified diffs.  Patches for the OpenBSD base system are distributed as unified diffs.
 Each patch is cryptographically signed with the  Each patch is cryptographically signed with the
 <a href="http://man.openbsd.org/signify">signify(1)</a> tool and contains  <a href="http://man.openbsd.org/OpenBSD-5.7/signify.1">signify(1)</a> tool and contains
 usage instructions.  usage instructions.
 All the following patches are also available in one  All the following patches are also available in one
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.7.tar.gz">tar.gz file</a>  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.7.tar.gz">tar.gz file</a>
Line 85 
Line 85 
   
 <ul>  <ul>
   
 <li id="001_sparc64_miniroot">  <li id="p001_sparc64_miniroot">
 <font color="#009000"><strong>001: INSTALL ISSUE: May 1, 2015</strong></font>  <font color="#009000"><strong>001: INSTALL ISSUE: May 1, 2015</strong></font>
 &nbsp; <i>sparc64</i><br>  &nbsp; <i>sparc64</i><br>
 The "miniroot" install method is broken (related to the addition of  The "miniroot" install method is broken (related to the addition of
Line 95 
Line 95 
 No patch is available for obvious reasons, so use a different install method.  No patch is available for obvious reasons, so use a different install method.
 <p>  <p>
   
 <li id="002_libxfont">  <li id="p002_libxfont">
 <font color="#009000"><strong>002: SECURITY FIX: March 18, 2015</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: March 18, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflows in libXfont  Buffer overflows in libXfont
Line 108 
Line 108 
 <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.  <br>Note that the instructions should read <code>cd /usr/xenocara/lib/libXfont</code>.
 <p>  <p>
   
 <li id="003_openssl">  <li id="p003_openssl">
 <font color="#009000"><strong>003: SECURITY FIX: March 19, 2015</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: March 19, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several crash causing defects from OpenSSL.<br>  Fix several crash causing defects from OpenSSL.<br>
Line 127 
Line 127 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="004_smtpd">  <li id="p004_smtpd">
 <font color="#009000"><strong>004: RELIABILITY FIX: April 17, 2015</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: April 17, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a logic error in smtpd handling of SNI.  Fix a logic error in smtpd handling of SNI.
Line 137 
Line 137 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="005_httpd">  <li id="p005_httpd">
 <font color="#009000"><strong>005: RELIABILITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A remote user can crash httpd by forcing the daemon to log to a file  A remote user can crash httpd by forcing the daemon to log to a file
Line 147 
Line 147 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="006_elf">  <li id="p006_elf">
 <font color="#009000"><strong>006: SECURITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malformed binaries could trigger kernel panics or view kernel memory.  Malformed binaries could trigger kernel panics or view kernel memory.
Line 156 
Line 156 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="007_tar">  <li id="p007_tar">
 <font color="#009000"><strong>007: SECURITY FIX: April 30, 2015</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: April 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple issues in tar/pax/cpio:  Multiple issues in tar/pax/cpio:
Line 171 
Line 171 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="008_smtpd">  <li id="p008_smtpd">
 <font color="#009000"><strong>008: RELIABILITY FIX: June 11, 2015</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: June 11, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability issues in smtpd:  Fix multiple reliability issues in smtpd:
Line 183 
Line 183 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="009_openssl">  <li id="p009_openssl">
 <font color="#009000"><strong>009: SECURITY FIX: June 11, 2015</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: June 11, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several defects from OpenSSL:  Fix several defects from OpenSSL:
Line 201 
Line 201 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="010_tcp">  <li id="p010_tcp">
 <font color="#009000"><strong>010: SECURITY FIX: July 14, 2015</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: July 14, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A TCP socket can become confused and not properly cleanup resources.  A TCP socket can become confused and not properly cleanup resources.
Line 210 
Line 210 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="011_execve">  <li id="p011_execve">
 <font color="#009000"><strong>011: RELIABILITY FIX: July 26, 2015</strong></font>  <font color="#009000"><strong>011: RELIABILITY FIX: July 26, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A kernel memory leak could be triggered by an unprivileged user in  A kernel memory leak could be triggered by an unprivileged user in
Line 220 
Line 220 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="012_patch">  <li id="p012_patch">
 <font color="#009000"><strong>012: SECURITY FIX: July 26, 2015</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: July 26, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could be made to invoke arbitrary commands via  The patch utility could be made to invoke arbitrary commands via
Line 231 
Line 231 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="013_patch">  <li id="p013_patch">
 <font color="#009000"><strong>013: SECURITY FIX: July 30, 2015</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: July 30, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could become desyncronized processing ed(1)-style diffs.  The patch utility could become desyncronized processing ed(1)-style diffs.
Line 240 
Line 240 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="014_sshd">  <li id="p014_sshd">
 <font color="#009000"><strong>014: SECURITY FIX: August 16, 2015</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: August 16, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A change to sshd resulted in incorrect permissions being applied to pseudo  A change to sshd resulted in incorrect permissions being applied to pseudo
Line 250 
Line 250 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="015_relayd">  <li id="p015_relayd">
 <font color="#009000"><strong>015: RELIABILITY FIX: September 28, 2015</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: September 28, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Various problems were identified in relayd and merged back from  Various problems were identified in relayd and merged back from
Line 260 
Line 260 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="016_uvm">  <li id="p016_uvm">
 <font color="#009000"><strong>016: RELIABILITY FIX: September 28, 2015</strong></font>  <font color="#009000"><strong>016: RELIABILITY FIX: September 28, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An incorrect operation in uvm could result in system panics.  An incorrect operation in uvm could result in system panics.
Line 269 
Line 269 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="017_smtpd">  <li id="p017_smtpd">
 <font color="#009000"><strong>017: SECURITY FIX: October 1, 2015</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: October 1, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability and security issues in smtpd:<br>  Fix multiple reliability and security issues in smtpd:<br>
Line 288 
Line 288 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="018_kevent">  <li id="p018_kevent">
 <font color="#009000"><strong>018: RELIABILITY FIX: October 14, 2015</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: October 14, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem with timer kevents could result in a kernel hang (local denial  A problem with timer kevents could result in a kernel hang (local denial
Line 297 
Line 297 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="019_obj2txt">  <li id="p019_obj2txt">
 <font color="#009000"><strong>019: RELIABILITY FIX: October 15, 2015</strong></font>  <font color="#009000"><strong>019: RELIABILITY FIX: October 15, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun  The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
Line 306 
Line 306 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="020_rsn">  <li id="p020_rsn">
 <font color="#009000"><strong>020: RELIABILITY FIX: November 9, 2015</strong></font>  <font color="#009000"><strong>020: RELIABILITY FIX: November 9, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient validation of RSN element group cipher values in 802.11  Insufficient validation of RSN element group cipher values in 802.11
Line 315 
Line 315 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="021_clientcert">  <li id="p021_clientcert">
 <font color="#009000"><strong>021: RELIABILITY FIX: Dec 3, 2015</strong></font>  <font color="#009000"><strong>021: RELIABILITY FIX: Dec 3, 2015</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A NULL pointer deference could be triggered by a crafted certificate sent to  A NULL pointer deference could be triggered by a crafted certificate sent to
Line 324 
Line 324 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="022_sshd">  <li id="p022_sshd">
 <font color="#009000"><strong>022: SECURITY FIX: January 14, 2016</strong></font>  <font color="#009000"><strong>022: SECURITY FIX: January 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Experimental roaming code in the ssh client could be tricked by a hostile sshd  Experimental roaming code in the ssh client could be tricked by a hostile sshd
Line 337 
Line 337 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="023_sshd">  <li id="p023_sshd">
 <font color="#009000"><strong>023: SECURITY FIX: March 10, 2016</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: March 10, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://www.openssh.com/txt/x11fwd.adv">  <a href="https://www.openssh.com/txt/x11fwd.adv">
Line 350 
Line 350 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="024_in6bind">  <li id="p024_in6bind">
 <font color="#009000"><strong>024: SECURITY FIX: March 16, 2016</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: March 16, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient checks in IPv6 socket binding and UDP IPv6 option  Insufficient checks in IPv6 socket binding and UDP IPv6 option

Legend:
Removed from v.1.44  
changed lines
  Added in v.1.45