[BACK]Return to errata57.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata57.html between version 1.50 and 1.51

version 1.50, 2019/04/02 12:46:57 version 1.51, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 5.7 Errata</title>  <title>OpenBSD 5.7 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata57.html">  <link rel="canonical" href="https://www.openbsd.org/errata57.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">5.7 Errata</font>  5.7 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 90 
Line 88 
 <ul>  <ul>
   
 <li id="p001_sparc64_miniroot">  <li id="p001_sparc64_miniroot">
 <font color="#009000"><strong>001: INSTALL ISSUE: May 1, 2015</strong></font>  <strong>001: INSTALL ISSUE: May 1, 2015</strong>
 &nbsp; <i>sparc64</i><br>  &nbsp; <i>sparc64</i><br>
 The "miniroot" install method is broken (related to the addition of  The "miniroot" install method is broken (related to the addition of
 softraid support).  This method is used by the official CD 3 as  softraid support).  This method is used by the official CD 3 as
Line 100 
Line 98 
 <p>  <p>
   
 <li id="p002_libxfont">  <li id="p002_libxfont">
 <font color="#009000"><strong>002: SECURITY FIX: March 18, 2015</strong></font>  <strong>002: SECURITY FIX: March 18, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflows in libXfont  Buffer overflows in libXfont
 <br>  <br>
Line 113 
Line 111 
 <p>  <p>
   
 <li id="p003_openssl">  <li id="p003_openssl">
 <font color="#009000"><strong>003: SECURITY FIX: March 19, 2015</strong></font>  <strong>003: SECURITY FIX: March 19, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several crash causing defects from OpenSSL.<br>  Fix several crash causing defects from OpenSSL.<br>
 These include:<br>  These include:<br>
Line 132 
Line 130 
 <p>  <p>
   
 <li id="p004_smtpd">  <li id="p004_smtpd">
 <font color="#009000"><strong>004: RELIABILITY FIX: April 17, 2015</strong></font>  <strong>004: RELIABILITY FIX: April 17, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a logic error in smtpd handling of SNI.  Fix a logic error in smtpd handling of SNI.
 This could allow a remote user to crash the server or provoke a disconnect of other sessions.  This could allow a remote user to crash the server or provoke a disconnect of other sessions.
Line 142 
Line 140 
 <p>  <p>
   
 <li id="p005_httpd">  <li id="p005_httpd">
 <font color="#009000"><strong>005: RELIABILITY FIX: April 30, 2015</strong></font>  <strong>005: RELIABILITY FIX: April 30, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A remote user can crash httpd by forcing the daemon to log to a file  A remote user can crash httpd by forcing the daemon to log to a file
 before the logging system was initialized.  before the logging system was initialized.
Line 152 
Line 150 
 <p>  <p>
   
 <li id="p006_elf">  <li id="p006_elf">
 <font color="#009000"><strong>006: SECURITY FIX: April 30, 2015</strong></font>  <strong>006: SECURITY FIX: April 30, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malformed binaries could trigger kernel panics or view kernel memory.  Malformed binaries could trigger kernel panics or view kernel memory.
 <br>  <br>
Line 161 
Line 159 
 <p>  <p>
   
 <li id="p007_tar">  <li id="p007_tar">
 <font color="#009000"><strong>007: SECURITY FIX: April 30, 2015</strong></font>  <strong>007: SECURITY FIX: April 30, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple issues in tar/pax/cpio:  Multiple issues in tar/pax/cpio:
 <ul>  <ul>
Line 176 
Line 174 
 <p>  <p>
   
 <li id="p008_smtpd">  <li id="p008_smtpd">
 <font color="#009000"><strong>008: RELIABILITY FIX: June 11, 2015</strong></font>  <strong>008: RELIABILITY FIX: June 11, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability issues in smtpd:  Fix multiple reliability issues in smtpd:
 <ul>  <ul>
Line 188 
Line 186 
 <p>  <p>
   
 <li id="p009_openssl">  <li id="p009_openssl">
 <font color="#009000"><strong>009: SECURITY FIX: June 11, 2015</strong></font>  <strong>009: SECURITY FIX: June 11, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix several defects from OpenSSL:  Fix several defects from OpenSSL:
 <ul>  <ul>
Line 206 
Line 204 
 <p>  <p>
   
 <li id="p010_tcp">  <li id="p010_tcp">
 <font color="#009000"><strong>010: SECURITY FIX: July 14, 2015</strong></font>  <strong>010: SECURITY FIX: July 14, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A TCP socket can become confused and not properly cleanup resources.  A TCP socket can become confused and not properly cleanup resources.
 <br>  <br>
Line 215 
Line 213 
 <p>  <p>
   
 <li id="p011_execve">  <li id="p011_execve">
 <font color="#009000"><strong>011: RELIABILITY FIX: July 26, 2015</strong></font>  <strong>011: RELIABILITY FIX: July 26, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A kernel memory leak could be triggered by an unprivileged user in  A kernel memory leak could be triggered by an unprivileged user in
 a failure case when using execve under systrace.  a failure case when using execve under systrace.
Line 225 
Line 223 
 <p>  <p>
   
 <li id="p012_patch">  <li id="p012_patch">
 <font color="#009000"><strong>012: SECURITY FIX: July 26, 2015</strong></font>  <strong>012: SECURITY FIX: July 26, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could be made to invoke arbitrary commands via  The patch utility could be made to invoke arbitrary commands via
 the obsolete RCS support when processing a crafted input file.  the obsolete RCS support when processing a crafted input file.
Line 236 
Line 234 
 <p>  <p>
   
 <li id="p013_patch">  <li id="p013_patch">
 <font color="#009000"><strong>013: SECURITY FIX: July 30, 2015</strong></font>  <strong>013: SECURITY FIX: July 30, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The patch utility could become desyncronized processing ed(1)-style diffs.  The patch utility could become desyncronized processing ed(1)-style diffs.
 <br>  <br>
Line 245 
Line 243 
 <p>  <p>
   
 <li id="p014_sshd">  <li id="p014_sshd">
 <font color="#009000"><strong>014: SECURITY FIX: August 16, 2015</strong></font>  <strong>014: SECURITY FIX: August 16, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A change to sshd resulted in incorrect permissions being applied to pseudo  A change to sshd resulted in incorrect permissions being applied to pseudo
 terminal devices, allowing local users to write to (but not read from) them.  terminal devices, allowing local users to write to (but not read from) them.
Line 255 
Line 253 
 <p>  <p>
   
 <li id="p015_relayd">  <li id="p015_relayd">
 <font color="#009000"><strong>015: RELIABILITY FIX: September 28, 2015</strong></font>  <strong>015: RELIABILITY FIX: September 28, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Various problems were identified in relayd and merged back from  Various problems were identified in relayd and merged back from
 current to 5.7 in this maintanance update.  current to 5.7 in this maintanance update.
Line 265 
Line 263 
 <p>  <p>
   
 <li id="p016_uvm">  <li id="p016_uvm">
 <font color="#009000"><strong>016: RELIABILITY FIX: September 28, 2015</strong></font>  <strong>016: RELIABILITY FIX: September 28, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An incorrect operation in uvm could result in system panics.  An incorrect operation in uvm could result in system panics.
 <br>  <br>
Line 274 
Line 272 
 <p>  <p>
   
 <li id="p017_smtpd">  <li id="p017_smtpd">
 <font color="#009000"><strong>017: SECURITY FIX: October 1, 2015</strong></font>  <strong>017: SECURITY FIX: October 1, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix multiple reliability and security issues in smtpd:<br>  Fix multiple reliability and security issues in smtpd:<br>
 <ul>  <ul>
Line 293 
Line 291 
 <p>  <p>
   
 <li id="p018_kevent">  <li id="p018_kevent">
 <font color="#009000"><strong>018: RELIABILITY FIX: October 14, 2015</strong></font>  <strong>018: RELIABILITY FIX: October 14, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem with timer kevents could result in a kernel hang (local denial  A problem with timer kevents could result in a kernel hang (local denial
 of service).<br>  of service).<br>
Line 302 
Line 300 
 <p>  <p>
   
 <li id="p019_obj2txt">  <li id="p019_obj2txt">
 <font color="#009000"><strong>019: RELIABILITY FIX: October 15, 2015</strong></font>  <strong>019: RELIABILITY FIX: October 15, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun  The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
 and memory leak, as reported by Qualys Security.<br>  and memory leak, as reported by Qualys Security.<br>
Line 311 
Line 309 
 <p>  <p>
   
 <li id="p020_rsn">  <li id="p020_rsn">
 <font color="#009000"><strong>020: RELIABILITY FIX: November 9, 2015</strong></font>  <strong>020: RELIABILITY FIX: November 9, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient validation of RSN element group cipher values in 802.11  Insufficient validation of RSN element group cipher values in 802.11
 beacons and probe responses could result in system panics.<br>  beacons and probe responses could result in system panics.<br>
Line 320 
Line 318 
 <p>  <p>
   
 <li id="p021_clientcert">  <li id="p021_clientcert">
 <font color="#009000"><strong>021: RELIABILITY FIX: Dec 3, 2015</strong></font>  <strong>021: RELIABILITY FIX: Dec 3, 2015</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A NULL pointer deference could be triggered by a crafted certificate sent to  A NULL pointer deference could be triggered by a crafted certificate sent to
 services configured to verify client certificates on TLS/SSL connections.<br>  services configured to verify client certificates on TLS/SSL connections.<br>
Line 329 
Line 327 
 <p>  <p>
   
 <li id="p022_sshd">  <li id="p022_sshd">
 <font color="#009000"><strong>022: SECURITY FIX: January 14, 2016</strong></font>  <strong>022: SECURITY FIX: January 14, 2016</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Experimental roaming code in the ssh client could be tricked by a hostile sshd  Experimental roaming code in the ssh client could be tricked by a hostile sshd
 server, potentially leaking key material.  CVE-2016-0777 and CVE-0216-0778.  server, potentially leaking key material.  CVE-2016-0777 and CVE-0216-0778.
Line 342 
Line 340 
 <p>  <p>
   
 <li id="p023_sshd">  <li id="p023_sshd">
 <font color="#009000"><strong>023: SECURITY FIX: March 10, 2016</strong></font>  <strong>023: SECURITY FIX: March 10, 2016</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://www.openssh.com/txt/x11fwd.adv">  <a href="https://www.openssh.com/txt/x11fwd.adv">
 Lack of credential sanitization allows injection of commands to xauth(1).</a>  Lack of credential sanitization allows injection of commands to xauth(1).</a>
Line 355 
Line 353 
 <p>  <p>
   
 <li id="p024_in6bind">  <li id="p024_in6bind">
 <font color="#009000"><strong>024: SECURITY FIX: March 16, 2016</strong></font>  <strong>024: SECURITY FIX: March 16, 2016</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient checks in IPv6 socket binding and UDP IPv6 option  Insufficient checks in IPv6 socket binding and UDP IPv6 option
 processing allow a local user to send UDP packets with a source  processing allow a local user to send UDP packets with a source
Line 368 
Line 366 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.50  
changed lines
  Added in v.1.51