[BACK]Return to errata64.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata64.html between version 1.18 and 1.19

version 1.18, 2019/05/16 17:12:03 version 1.19, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 6.4 Errata</title>  <title>OpenBSD 6.4 Errata</title>
 <meta name="description" content="the OpenBSD errata page">  <meta name="description" content="the OpenBSD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata64.html">  <link rel="canonical" href="https://www.openbsd.org/errata64.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">6.4 Errata</font>  6.4 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 95 
Line 93 
 <ul>  <ul>
   
 <li id="p001_xserver">  <li id="p001_xserver">
 <font color="#009000">  <strong>001: SECURITY FIX: October 25, 2018</strong>
 <strong>001: SECURITY FIX: October 25, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The Xorg X server incorrectly validates certain options, allowing arbitrary  The Xorg X server incorrectly validates certain options, allowing arbitrary
Line 109 
Line 106 
 <p>  <p>
   
 <li id="p002_syspatch">  <li id="p002_syspatch">
 <font color="#009000">  <strong>002: RELIABILITY FIX: November 2, 2018</strong>
 <strong>002: RELIABILITY FIX: November 2, 2018</strong></font>  
 &nbsp; <i>i386, amd64, arm64</i>  &nbsp; <i>i386, amd64, arm64</i>
 <br>  <br>
 The syspatch utility incorrectly handles symbolic links.  The syspatch utility incorrectly handles symbolic links.
Line 120 
Line 116 
 <p>  <p>
   
 <li id="p003_portsmash">  <li id="p003_portsmash">
 <font color="#009000">  <strong>003: SECURITY FIX: November 17, 2018</strong>
 <strong>003: SECURITY FIX: November 17, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The portsmash vulnerability allows exfiltration of elliptic curve keys.  The portsmash vulnerability allows exfiltration of elliptic curve keys.
Line 131 
Line 126 
 <p>  <p>
   
 <li id="p004_lockf">  <li id="p004_lockf">
 <font color="#009000">  <strong>004: RELIABILITY FIX: November 17, 2018</strong>
 <strong>004: RELIABILITY FIX: November 17, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 A recent change to POSIX file locks could cause incorrect results  A recent change to POSIX file locks could cause incorrect results
Line 143 
Line 137 
 <p>  <p>
   
 <li id="p005_perl">  <li id="p005_perl">
 <font color="#009000">  <strong>005: SECURITY FIX: November 29, 2018</strong>
 <strong>005: SECURITY FIX: November 29, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 Various overflows exist in perl.  Various overflows exist in perl.
Line 154 
Line 147 
 <p>  <p>
   
 <li id="p006_uipc">  <li id="p006_uipc">
 <font color="#009000">  <strong>006: RELIABILITY FIX: November 29, 2018</strong>
 <strong>006: RELIABILITY FIX: November 29, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 UNIX domain sockets leak kernel memory with MSG_PEEK on SCM_RIGHTS, or can  UNIX domain sockets leak kernel memory with MSG_PEEK on SCM_RIGHTS, or can
Line 166 
Line 158 
 <p>  <p>
   
 <li id="p007_smtpd">  <li id="p007_smtpd">
 <font color="#009000">  <strong>007: RELIABILITY FIX: November 29, 2018</strong>
 <strong>007: RELIABILITY FIX: November 29, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The mail.mda and mail.lmtp delivery agents were not reporting temporary  The mail.mda and mail.lmtp delivery agents were not reporting temporary
Line 179 
Line 170 
 <p>  <p>
   
 <li id="p008_qcow2">  <li id="p008_qcow2">
 <font color="#009000">  <strong>008: RELIABILITY FIX: November 29, 2018</strong>
 <strong>008: RELIABILITY FIX: November 29, 2018</strong></font>  
 &nbsp; <i>amd64 and i386</i>  &nbsp; <i>amd64 and i386</i>
 <br>  <br>
 Writing more than 4GB to a qcow2 volume corrupts the virtual disk.  Writing more than 4GB to a qcow2 volume corrupts the virtual disk.
Line 190 
Line 180 
 <p>  <p>
   
 <li id="p009_recvwait">  <li id="p009_recvwait">
 <font color="#009000">  <strong>009: RELIABILITY FIX: December 20, 2018</strong>
 <strong>009: RELIABILITY FIX: December 20, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 While recv(2) with the MSG_WAITALL flag was receiving control  While recv(2) with the MSG_WAITALL flag was receiving control
Line 202 
Line 191 
 <p>  <p>
   
 <li id="p010_pcbopts">  <li id="p010_pcbopts">
 <font color="#009000">  <strong>010: SECURITY FIX: December 22, 2018</strong>
 <strong>010: SECURITY FIX: December 22, 2018</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The setsockopt(2) system call could overflow mbuf cluster kernel  The setsockopt(2) system call could overflow mbuf cluster kernel
Line 214 
Line 202 
 <p>  <p>
   
 <li id="p011_mincore">  <li id="p011_mincore">
 <font color="#009000">  <strong>011: SECURITY FIX: January 27, 2019</strong>
 <strong>011: SECURITY FIX: January 27, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The mincore() system call can be used to observe memory access patterns  The mincore() system call can be used to observe memory access patterns
Line 226 
Line 213 
 <p>  <p>
   
 <li id="p012_nfs">  <li id="p012_nfs">
 <font color="#009000">  <strong>012: RELIABILITY FIX: January 27, 2019</strong>
 <strong>012: RELIABILITY FIX: January 27, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 Missing length checks in the NFS server and client can lead to crashes  Missing length checks in the NFS server and client can lead to crashes
Line 238 
Line 224 
 <p>  <p>
   
 <li id="p013_unveil">  <li id="p013_unveil">
 <font color="#009000">  <strong>013: SECURITY FIX: January 27, 2019</strong>
 <strong>013: SECURITY FIX: January 27, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 The unveil() system call can leak memory.  The unveil() system call can leak memory.
Line 249 
Line 234 
 <p>  <p>
   
 <li id="p014_pf6frag">  <li id="p014_pf6frag">
 <font color="#009000">  <strong>014: SECURITY FIX: March 1, 2019</strong>
 <strong>014: SECURITY FIX: March 1, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 Fragmented IPv6 packets may be erroneously passed by pf or lead to a crash.  Fragmented IPv6 packets may be erroneously passed by pf or lead to a crash.
Line 260 
Line 244 
 <p>  <p>
   
 <li id="p015_pficmp">  <li id="p015_pficmp">
 <font color="#009000">  <strong>015: SECURITY FIX: March 22, 2019</strong>
 <strong>015: SECURITY FIX: March 22, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 A state in pf could pass ICMP packets to a destination IP address  A state in pf could pass ICMP packets to a destination IP address
Line 272 
Line 255 
 <p>  <p>
   
 <li id="p016_vmmints">  <li id="p016_vmmints">
 <font color="#009000">  <strong>016: SECURITY FIX: March 27, 2019</strong>
 <strong>016: SECURITY FIX: March 27, 2019</strong></font>  
 &nbsp; <i>amd64 and i386</i>  &nbsp; <i>amd64 and i386</i>
 <br>  <br>
 GDT and IDT limits were improperly restored during VMM context switches.  GDT and IDT limits were improperly restored during VMM context switches.
Line 283 
Line 265 
 <p>  <p>
   
 <li id="p017_rip6cksum">  <li id="p017_rip6cksum">
 <font color="#009000">  <strong>017: RELIABILITY FIX: May 3, 2019</strong>
 <strong>017: RELIABILITY FIX: May 3, 2019</strong></font>  
 &nbsp; <i>All architectures</i>  &nbsp; <i>All architectures</i>
 <br>  <br>
 If a userland program sets the IPv6 checksum offset on a raw socket,  If a userland program sets the IPv6 checksum offset on a raw socket,
Line 297 
Line 278 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.18  
changed lines
  Added in v.1.19