Annotation of www/errata58.html, Revision 1.10
1.1 deraadt 1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2: <html>
3: <head>
4: <title>OpenBSD 5.8 errata</title>
5: <meta name="description" content="the OpenBSD CD errata page">
6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
7: <link rel="canonical" href="http://www.openbsd.org/errata58.html">
8: </head>
9:
10: <!--
11: IMPORTANT REMINDER
12: IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
13: -->
14:
15: <body bgcolor="#ffffff" text="#000000" link="#23238E">
16:
17: <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
18: <h2><font color="#e00000">
19: OpenBSD 5.8 errata
20: </font></h2>
21:
22: <hr>
23: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
24: <br>
25: For errata on a certain release, click below:<br>
26: <a href="errata21.html">2.1</a>,
27: <a href="errata22.html">2.2</a>,
28: <a href="errata23.html">2.3</a>,
29: <a href="errata24.html">2.4</a>,
30: <a href="errata25.html">2.5</a>,
31: <a href="errata26.html">2.6</a>,
32: <a href="errata27.html">2.7</a>,
33: <a href="errata28.html">2.8</a>,
34: <a href="errata29.html">2.9</a>,
35: <a href="errata30.html">3.0</a>,
36: <a href="errata31.html">3.1</a>,
37: <a href="errata32.html">3.2</a>,
38: <a href="errata33.html">3.3</a>,
39: <a href="errata34.html">3.4</a>,
40: <a href="errata35.html">3.5</a>,
41: <a href="errata36.html">3.6</a>,
42: <br>
43: <a href="errata37.html">3.7</a>,
44: <a href="errata38.html">3.8</a>,
45: <a href="errata39.html">3.9</a>,
46: <a href="errata40.html">4.0</a>,
47: <a href="errata41.html">4.1</a>,
48: <a href="errata42.html">4.2</a>,
49: <a href="errata43.html">4.3</a>,
50: <a href="errata44.html">4.4</a>,
51: <a href="errata45.html">4.5</a>,
52: <a href="errata46.html">4.6</a>,
53: <a href="errata47.html">4.7</a>,
54: <a href="errata48.html">4.8</a>,
55: <a href="errata49.html">4.9</a>,
56: <a href="errata50.html">5.0</a>,
57: <a href="errata51.html">5.1</a>,
58: <a href="errata52.html">5.2</a>,
59: <br>
60: <a href="errata53.html">5.3</a>,
61: <a href="errata54.html">5.4</a>,
62: <a href="errata55.html">5.5</a>,
63: <a href="errata56.html">5.6</a>,
64: <a href="errata57.html">5.7</a>.
65: <br>
66: <hr>
67:
68: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8.tar.gz">
69: You can also fetch a tar.gz file containing all the following patches</a>.
70: This file is updated once a day.
71: <p>
72:
73: The patches below are available in CVS via the
74: <code>OPENBSD_5_8</code> <a href="stable.html">patch branch</a>.
75: <p>
76:
77: For more detailed information on how to install patches to OpenBSD, please
78: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
79: <p>
80:
81: <hr>
82:
83: <ul>
84:
1.2 deraadt 85: <li id="001_sshd">
86: <font color="#009000"><strong>001: SECURITY FIX: August 30, 2015</strong></font>
87: <i>All architectures</i><br>
88: Inverted logic made PermitRootLogin "prohibit-password" unsafe.
89: Use "no" (which is the installer default), or apply the following patch.
90: <br>
91: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/001_sshd.patch.sig">
92: A source code patch exists which remedies this problem.</a>
93: <p>
1.1 deraadt 94:
1.3 deraadt 95: <li id="002_sslhello">
96: <font color="#009000"><strong>002: INTEROPERABILITY FIX: August 30, 2015</strong></font>
97: <i>All architectures</i><br>
98: LibreSSL 2.2.2 incorrectly handles ClientHello messages that do not
99: include TLS extensions, resulting in such handshakes being aborted.
100: <br>
101: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/002_sslhello.patch.sig">
102: A source code patch exists which remedies this problem.</a>
103: <p>
104:
1.4 deraadt 105: <li id="003_uvm">
106: <font color="#009000"><strong>003: RELIABILITY FIX: September 28, 2015</strong></font>
107: <i>All architectures</i><br>
108: An incorrect operation in uvm could result in system panics.
109: <br>
110: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/003_uvm.patch.sig">
111: A source code patch exists which remedies this problem.</a>
112: <p>
113:
1.5 deraadt 114: <li id="004_smtpd">
115: <font color="#009000"><strong>004: SECURITY FIX: October 1, 2015</strong></font>
116: <i>All architectures</i><br>
117: Fix multiple reliability and security issues in smtpd:<br>
118: <ul>
119: <li>local and remote users could make smtpd crash or stop serving requests.
120: <li>a buffer overflow in the unprivileged, non-chrooted smtpd (lookup)
121: process could allow a local user to cause a crash or potentially
122: execute arbitrary code.
123: <li>a use-after-free in the unprivileged, non-chrooted smtpd (lookup)
124: process could allow a remote attacker to cause a crash or potentially
125: execute arbitrary code.
126: <li>hardlink and symlink attacks allowed a local user to unset chflags or
127: leak the first line of an arbitrary file.
128: </ul>
129: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/004_smtpd.patch.sig">
130: A source code patch exists which remedies this problem.</a>
131: <p>
132:
1.6 sthen 133: <li id="005_kevent">
134: <font color="#009000"><strong>005: RELIABILITY FIX: October 14, 2015</strong></font>
135: <i>All architectures</i><br>
136: A problem with timer kevents could result in a kernel hang (local denial
137: of service).<br>
138: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/005_kevent.patch.sig">
139: A source code patch exists which remedies this problem.</a>
140: <p>
141:
1.7 deraadt 142: <li id="006_src">
143: <font color="#009000"><strong>006: RELEASE CD ISSUE: Oct 18, 2015</strong></font>
144: <i>All architectures</i><br>
145: The "src.tar.gz" file on the source tree was created on the wrong day,
146: and does not match the 5.8 release builds.
147:
148: <br>
149: <a href="http://ftp.openbsd.org/pub/OpenBSD/5.8/cd-src.tar.gz">
150: A replacement file is available</a> in the 5.8 release directory with the name <b>cd-src.tar.gz</b>; due to size of the file, check local mirrors also.
151: <p>
152:
1.8 tedu 153: <li id="007_obj2txt">
154: <font color="#009000"><strong>007: RELIABILITY FIX: October 15, 2015</strong></font>
155: <i>All architectures</i><br>
156: The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
157: and memory leak, as reported by Qualys Security.<br>
158: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/007_obj2txt.patch.sig">
159: A source code patch exists which remedies this problem.</a>
160: <p>
161:
1.9 stsp 162: <li id="008_rsn">
163: <font color="#009000"><strong>008: RELIABILITY FIX: November 9, 2015</strong></font>
164: <i>All architectures</i><br>
165: Insufficient validation of RSN element group cipher values in 802.11
166: beacons and probe responses could result in system panics.<br>
167: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/008_rsn.patch.sig">
168: A source code patch exists which remedies this problem.</a>
169: <p>
170:
1.10 ! beck 171: <li id="009_clientcert">
! 172: <font color="#009000"><strong>009: RELIABILITY FIX: Dec 3, 2015</strong></font>
! 173: <i>All architectures</i><br>
! 174: A NULL pointer deference could be triggered by a crafted certificate sent to
! 175: services configured to verify client certificates on TLS/SSL connecitons.
! 176: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/009_clientcert.patch.sig">
! 177: A source code patch exists which remedies this problem.</a>
! 178: <p>
! 179:
1.1 deraadt 180: </ul>
181:
182: <hr>
183:
184: </body>
185: </html>