[BACK]Return to errata59.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata59.html between version 1.38 and 1.39

version 1.38, 2017/03/27 20:25:28 version 1.39, 2017/03/28 06:41:18
Line 70 
Line 70 
 <p>  <p>
 Patches for the OpenBSD base system are distributed as unified diffs.  Patches for the OpenBSD base system are distributed as unified diffs.
 Each patch is cryptographically signed with the  Each patch is cryptographically signed with the
 <a href="http://man.openbsd.org/signify">signify(1)</a> tool and contains  <a href="http://man.openbsd.org/OpenBSD-5.9/signify.1">signify(1)</a> tool and contains
 usage instructions.  usage instructions.
 All the following patches are also available in one  All the following patches are also available in one
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.9.tar.gz">tar.gz file</a>  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.9.tar.gz">tar.gz file</a>
Line 85 
Line 85 
   
 <ul>  <ul>
   
 <li id="001_sshd">  <li id="p001_sshd">
 <font color="#009000"><strong>001: SECURITY FIX: March 10, 2016</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: March 10, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://www.openssh.com/txt/x11fwd.adv">  <a href="https://www.openssh.com/txt/x11fwd.adv">
Line 98 
Line 98 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="002_in6bind">  <li id="p002_in6bind">
 <font color="#009000"><strong>002: SECURITY FIX: March 16, 2016</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: March 16, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient checks in IPv6 socket binding and UDP IPv6 option  Insufficient checks in IPv6 socket binding and UDP IPv6 option
Line 109 
Line 109 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="003_pledge">  <li id="p003_pledge">
 <font color="#009000"><strong>003: RELIABILITY FIX: March 16, 2016</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: March 16, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect path processing in pledge_namei() could result in unexpected  Incorrect path processing in pledge_namei() could result in unexpected
Line 119 
Line 119 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="004_mbuf">  <li id="p004_mbuf">
 <font color="#009000"><strong>004: RELIABILITY FIX: April 30, 2016</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: April 30, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem in m_dup_pkt() can result in kernel crashes with carp(4).  A problem in m_dup_pkt() can result in kernel crashes with carp(4).
Line 128 
Line 128 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="005_crypto">  <li id="p005_crypto">
 <font color="#009000"><strong>005: SECURITY FIX: May 3, 2016</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: May 3, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix issues in the libcrypto library.  Fix issues in the libcrypto library.
Line 144 
Line 144 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="006_smtpd">  <li id="p006_smtpd">
 <font color="#009000"><strong>006: RELIABILITY FIX: May 16, 2016</strong></font>  <font color="#009000"><strong>006: RELIABILITY FIX: May 16, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix issues in smtpd.  Fix issues in smtpd.
Line 156 
Line 156 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="007_uvideo">  <li id="p007_uvideo">
 <font color="#009000"><strong>007: SECURITY FIX: May 17, 2016</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: May 17, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient checks in the uvideo(4) V4L2 ioctl handling leak kernel  Insufficient checks in the uvideo(4) V4L2 ioctl handling leak kernel
Line 166 
Line 166 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="008_bnx">  <li id="p008_bnx">
 <font color="#009000"><strong>008: RELIABILITY FIX: May 18, 2016</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: May 18, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix issue in the bnx(4) ethernet driver that could cause data corruption.  Fix issue in the bnx(4) ethernet driver that could cause data corruption.
Line 175 
Line 175 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="009_crypto">  <li id="p009_crypto">
 <font color="#009000"><strong>009: RELIABILITY FIX: May 29, 2016</strong></font>  <font color="#009000"><strong>009: RELIABILITY FIX: May 29, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a bug in the libcrypto library when parsing certain ASN.1 elements.  Fix a bug in the libcrypto library when parsing certain ASN.1 elements.
Line 184 
Line 184 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="010_libexpat">  <li id="p010_libexpat">
 <font color="#009000"><strong>010: SECURITY FIX: June 2, 2016</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: June 2, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix issues in the libexpat library to prevent multiple integer and  Fix issues in the libexpat library to prevent multiple integer and
Line 194 
Line 194 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="011_crypto">  <li id="p011_crypto">
 <font color="#009000"><strong>011: SECURITY FIX: June 6, 2016</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: June 6, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Correct a problem that prevents the DSA signing algorithm from running  Correct a problem that prevents the DSA signing algorithm from running
Line 204 
Line 204 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="012_crypto">  <li id="p012_crypto">
 <font color="#009000"><strong>012: SECURITY FIX: June 27, 2016</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: June 27, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Correct a problem that could result in incorrect parsing/encoding of times in OCSP messages.  Correct a problem that could result in incorrect parsing/encoding of times in OCSP messages.
Line 213 
Line 213 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="013_splice">  <li id="p013_splice">
 <font color="#009000"><strong>013: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Splicing sockets in a loop could cause a kernel spin.  Splicing sockets in a loop could cause a kernel spin.
Line 222 
Line 222 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="014_unp">  <li id="p014_unp">
 <font color="#009000"><strong>014: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>014: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple processes exiting with a fd-passing control message on a  Multiple processes exiting with a fd-passing control message on a
Line 232 
Line 232 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="015_dirent">  <li id="p015_dirent">
 <font color="#009000"><strong>015: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 ufs_readdir failed to limit size of memory allocation, leading to panics.  ufs_readdir failed to limit size of memory allocation, leading to panics.
Line 241 
Line 241 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="016_mmap">  <li id="p016_mmap">
 <font color="#009000"><strong>016: SECURITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The mmap extension __MAP_NOFAULT could overcommit resources and crash  The mmap extension __MAP_NOFAULT could overcommit resources and crash
Line 251 
Line 251 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="017_arp">  <li id="p017_arp">
 <font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>017: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race occuring in the unlocked ARP input path can lead to a kernel  A race occuring in the unlocked ARP input path can lead to a kernel
Line 261 
Line 261 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="018_timeout">  <li id="p018_timeout">
 <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Tick counting overflows could cause a kernel crash.  Tick counting overflows could cause a kernel crash.
Line 270 
Line 270 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="019_kevent">  <li id="p019_kevent">
 <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>019: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Invalid file descriptor use with kevent(2) could lead to a kernel crash.  Invalid file descriptor use with kevent(2) could lead to a kernel crash.
Line 279 
Line 279 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="020_amap">  <li id="p020_amap">
 <font color="#009000"><strong>020: RELIABILITY FIX: July 14, 2016</strong></font>  <font color="#009000"><strong>020: RELIABILITY FIX: July 14, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Unchecked parameters and integer overflows in the amap allocation routines  Unchecked parameters and integer overflows in the amap allocation routines
Line 290 
Line 290 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="021_relayd">  <li id="p021_relayd">
 <font color="#009000"><strong>021: RELIABILITY FIX: July 25, 2016</strong></font>  <font color="#009000"><strong>021: RELIABILITY FIX: July 25, 2016</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When signaling an error to an HTTP relay client, the connection can be  When signaling an error to an HTTP relay client, the connection can be
Line 300 
Line 300 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="022_sysctl">  <li id="p022_sysctl">
 <font color="#009000">  <font color="#009000">
 <strong>022: RELIABILITY FIX: August 2, 2016</strong></font>  <strong>022: RELIABILITY FIX: August 2, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 311 
Line 311 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="023_uvmisavail">  <li id="p023_uvmisavail">
 <font color="#009000">  <font color="#009000">
 <strong>023: RELIABILITY FIX: August 2, 2016</strong></font>  <strong>023: RELIABILITY FIX: August 2, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 322 
Line 322 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="024_perl">  <li id="p024_perl">
 <font color="#009000">  <font color="#009000">
 <strong>024: SECURITY FIX: August 6, 2016</strong></font>  <strong>024: SECURITY FIX: August 6, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 335 
Line 335 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="025_relayd">  <li id="p025_relayd">
 <font color="#009000">  <font color="#009000">
 <strong>025: RELIABILITY FIX: August 6, 2016</strong></font>  <strong>025: RELIABILITY FIX: August 6, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 347 
Line 347 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="026_wsfont">  <li id="p026_wsfont">
 <font color="#009000">  <font color="#009000">
 <strong>026: RELIABILITY FIX: September 17, 2016</strong></font>  <strong>026: RELIABILITY FIX: September 17, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 358 
Line 358 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="027_libssl">  <li id="p027_libssl">
 <font color="#009000">  <font color="#009000">
 <strong>027: RELIABILITY FIX: September 22, 2016</strong></font>  <strong>027: RELIABILITY FIX: September 22, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 370 
Line 370 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="028_libssl">  <li id="p028_libssl">
 <font color="#009000">  <font color="#009000">
 <strong>028: SECURITY FIX: September 22, 2016</strong></font>  <strong>028: SECURITY FIX: September 22, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 381 
Line 381 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="029_xorg_libs">  <li id="p029_xorg_libs">
 <font color="#009000">  <font color="#009000">
 <strong>029: SECURITY FIX: October 4, 2016</strong></font>  <strong>029: SECURITY FIX: October 4, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 393 
Line 393 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="030_ssh_kexinit">  <li id="p030_ssh_kexinit">
 <font color="#009000">  <font color="#009000">
 <strong>030: RELIABILITY FIX: October 10, 2016</strong></font>  <strong>030: RELIABILITY FIX: October 10, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 405 
Line 405 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="031_smtpd.patch">  <li id="p031_smtpd.patch">
 <font color="#009000">  <font color="#009000">
 <strong>031: RELIABILITY FIX: October 13, 2016</strong></font>  <strong>031: RELIABILITY FIX: October 13, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 416 
Line 416 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="032_libssl.patch">  <li id="p032_libssl.patch">
 <font color="#009000">  <font color="#009000">
 <strong>032: RELIABILITY FIX: November 5, 2016</strong></font>  <strong>032: RELIABILITY FIX: November 5, 2016</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 427 
Line 427 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="033_libcrypto.patch">  <li id="p033_libcrypto.patch">
 <font color="#009000">  <font color="#009000">
 <strong>033: SECURITY FIX: January 5, 2017</strong></font>  <strong>033: SECURITY FIX: January 5, 2017</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 438 
Line 438 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="034_httpd.patch">  <li id="p034_httpd.patch">
 <font color="#009000">  <font color="#009000">
 <strong>034: RELIABILITY FIX: January 31, 2017</strong></font>  <strong>034: RELIABILITY FIX: January 31, 2017</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 451 
Line 451 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="035_net80211.patch">  <li id="p035_net80211.patch">
 <font color="#009000">  <font color="#009000">
 <strong>035: SECURITY FIX: March 1, 2017</strong></font>  <strong>035: SECURITY FIX: March 1, 2017</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 463 
Line 463 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="036_pf.patch">  <li id="p036_pf.patch">
 <font color="#009000">  <font color="#009000">
 <strong>036: RELIABILITY FIX: March 9, 2017</strong></font>  <strong>036: RELIABILITY FIX: March 9, 2017</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
Line 475 
Line 475 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li id="037_exec_elf.patch">  <li id="p037_exec_elf.patch">
 <font color="#009000">  <font color="#009000">
 <strong>037: SECURITY FIX: March 20, 2017</strong></font>  <strong>037: SECURITY FIX: March 20, 2017</strong></font>
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>

Legend:
Removed from v.1.38  
changed lines
  Added in v.1.39