[BACK]Return to errata59.html CVS log [TXT][DIR] Up to [local] / www

Annotation of www/errata59.html, Revision 1.9

1.1       deraadt     1: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
                      2: <html>
                      3: <head>
1.6       tj          4: <title>OpenBSD 5.9 Errata</title>
1.1       deraadt     5: <meta name="description" content="the OpenBSD CD errata page">
                      6: <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
1.4       deraadt     7: <meta name="viewport" content="width=device-width, initial-scale=1">
                      8: <link rel="stylesheet" type="text/css" href="openbsd.css">
1.5       tb          9: <link rel="canonical" href="http://www.openbsd.org/errata59.html">
1.1       deraadt    10: </head>
                     11:
                     12: <!--
                     13:                        IMPORTANT REMINDER
                     14:        IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
                     15: -->
                     16: <body bgcolor="#ffffff" text="#000000" link="#23238E">
                     17:
1.4       deraadt    18: <h2>
                     19: <a href="index.html">
                     20: <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>
1.6       tj         21: <font color="#e00000">5.9 Errata</font>
                     22: </h2>
1.4       deraadt    23: <hr>
1.1       deraadt    24:
                     25: <a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
                     26: <br>
                     27: For errata on a certain release, click below:<br>
                     28: <a href="errata21.html">2.1</a>,
                     29: <a href="errata22.html">2.2</a>,
                     30: <a href="errata23.html">2.3</a>,
                     31: <a href="errata24.html">2.4</a>,
                     32: <a href="errata25.html">2.5</a>,
                     33: <a href="errata26.html">2.6</a>,
                     34: <a href="errata27.html">2.7</a>,
                     35: <a href="errata28.html">2.8</a>,
                     36: <a href="errata29.html">2.9</a>,
                     37: <a href="errata30.html">3.0</a>,
                     38: <a href="errata31.html">3.1</a>,
                     39: <a href="errata32.html">3.2</a>,
                     40: <a href="errata33.html">3.3</a>,
                     41: <a href="errata34.html">3.4</a>,
                     42: <a href="errata35.html">3.5</a>,
                     43: <a href="errata36.html">3.6</a>,
                     44: <br>
                     45: <a href="errata37.html">3.7</a>,
                     46: <a href="errata38.html">3.8</a>,
                     47: <a href="errata39.html">3.9</a>,
                     48: <a href="errata40.html">4.0</a>,
                     49: <a href="errata41.html">4.1</a>,
                     50: <a href="errata42.html">4.2</a>,
                     51: <a href="errata43.html">4.3</a>,
                     52: <a href="errata44.html">4.4</a>,
                     53: <a href="errata45.html">4.5</a>,
                     54: <a href="errata46.html">4.6</a>,
                     55: <a href="errata47.html">4.7</a>,
                     56: <a href="errata48.html">4.8</a>,
                     57: <a href="errata49.html">4.9</a>,
                     58: <a href="errata50.html">5.0</a>,
                     59: <a href="errata51.html">5.1</a>,
                     60: <a href="errata52.html">5.2</a>,
                     61: <br>
                     62: <a href="errata53.html">5.3</a>,
                     63: <a href="errata54.html">5.4</a>,
                     64: <a href="errata55.html">5.5</a>,
                     65: <a href="errata56.html">5.6</a>,
                     66: <a href="errata57.html">5.7</a>,
                     67: <a href="errata58.html">5.8</a>.
                     68: <br>
                     69: <hr>
                     70:
                     71: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9.tar.gz">
                     72: You can also fetch a tar.gz file containing all the following patches</a>.
                     73: This file is updated once a day.
                     74: <p>
                     75:
                     76: The patches below are available in CVS via the
                     77: <code>OPENBSD_5_9</code> <a href="stable.html">patch branch</a>.
                     78: <p>
                     79:
                     80: For more detailed information on how to install patches to OpenBSD, please
                     81: consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
                     82: <p>
                     83:
                     84: <hr>
                     85:
                     86: <ul>
                     87:
1.2       deraadt    88: <li id="001_sshd">
                     89: <font color="#009000"><strong>001: SECURITY FIX: March 10, 2016</strong></font>
                     90: &nbsp; <i>All architectures</i><br>
                     91: <a href="http://www.openssh.com/txt/x11fwd.adv">
                     92: Lack of credential sanitization allows injection of commands to xauth(1).</a>
                     93: <br>
                     94: Prevent this problem immediately by not using the "X11Forwarding" feature
                     95: (which is disabled by default)
                     96: <br>
                     97: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/001_sshd.patch.sig">
                     98: A source code patch exists which remedies this problem.</a>
                     99: <p>
1.1       deraadt   100:
1.3       deraadt   101: <li id="002_in6bind">
                    102: <font color="#009000"><strong>002: SECURITY FIX: March 16, 2016</strong></font>
                    103: &nbsp; <i>All architectures</i><br>
                    104: Insufficient checks in IPv6 socket binding and UDP IPv6 option
                    105: processing allow a local user to send UDP packets with a source
                    106: (IPv6 address + port) already reserved by another user.
                    107: <br>
                    108: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/002_in6bind.patch.sig">
                    109: A source code patch exists which remedies this problem.</a>
                    110: <p>
                    111:
                    112: <li id="003_pledge">
                    113: <font color="#009000"><strong>003: RELIABILITY FIX: March 16, 2016</strong></font>
                    114: &nbsp; <i>All architectures</i><br>
                    115: Incorrect path processing in pledge_namei() could result in unexpected
                    116: program termination of pledge(2)'d programs.
                    117: <br>
                    118: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/003_pledge.patch.sig">
                    119: A source code patch exists which remedies this problem.</a>
                    120: <p>
                    121:
1.7       sthen     122: <li id="004_mbuf">
                    123: <font color="#009000"><strong>004: RELIABILITY FIX: April 30, 2016</strong></font>
                    124: &nbsp; <i>All architectures</i><br>
                    125: A problem in m_dup_pkt() can result in kernel crashes with carp(4).
                    126: <br>
                    127: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/004_mbuf.patch.sig">
                    128: A source code patch exists which remedies this problem.</a>
                    129: <p>
                    130:
1.8       tedu      131: <li id="005_crypto">
                    132: <font color="#009000"><strong>005: SECURITY FIX: May 3, 2016</strong></font>
                    133: &nbsp; <i>All architectures</i><br>
                    134: Fix issues in the libcrypto library.
                    135: Refer to <a href="https://www.openssl.org/news/secadv/20160503.txt">the advisory</a>.
                    136: <ul>
                    137: <li>Memory corruption in the ASN.1 encoder (CVE-2016-2108)
                    138: <li>Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
                    139: <li>EVP_EncodeUpdate overflow (CVE-2016-2105)
                    140: <li>EVP_EncryptUpdate overflow (CVE-2016-2106)
                    141: <li>ASN.1 BIO excessive memory allocation (CVE-2016-2109)
                    142: </ul>
                    143: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/005_crypto.patch.sig">
                    144: A source code patch exists which remedies this problem.</a>
                    145: <p>
                    146:
1.9     ! gilles    147: <li id="006_smtpd">
        !           148: <font color="#009000"><strong>006: RELIABILITY FIX: May 16, 2016</strong></font>
        !           149: &nbsp; <i>All architectures</i><br>
        !           150: Fix issues in smtpd.
        !           151: <ul>
        !           152:   <li>Fix logic issue in smtp state machine that can lead to invalid state and result in crash.
        !           153:   <li>Plug file pointer leak that can lead to resources exhaustion and result in crash.
        !           154: </ul>
        !           155: <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/006_smtpd.patch.sig">
        !           156: A source code patch exists which remedies this problem.</a>
        !           157: <p>
        !           158:
1.1       deraadt   159: </ul>
                    160:
                    161: <hr>
                    162:
                    163: </body>
                    164: </html>