[BACK]Return to security.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/security.html between version 1.417 and 1.418

version 1.417, 2014/07/28 16:48:23 version 1.418, 2014/08/20 01:10:04
Line 21 
Line 21 
 For security advisories for specific releases, click below:  For security advisories for specific releases, click below:
 <p>  <p>
   
 <a href="#20">2.0</a>,  <a href="errata20.html">2.0</a>,
 <a href="#21">2.1</a>,  <a href="errata21.html">2.1</a>,
 <a href="#22">2.2</a>,  <a href="errata22.html">2.2</a>,
 <a href="#23">2.3</a>,  <a href="errata23.html">2.3</a>,
 <a href="#24">2.4</a>,  <a href="errata24.html">2.4</a>,
 <a href="#25">2.5</a>,  <a href="errata25.html">2.5</a>,
 <a href="#26">2.6</a>,  <a href="errata26.html">2.6</a>,
 <a href="#27">2.7</a>,  <a href="errata27.html">2.7</a>,
 <a href="#28">2.8</a>,  <a href="errata28.html">2.8</a>,
 <a href="#29">2.9</a>,  <a href="errata29.html">2.9</a>,
 <a href="#30">3.0</a>,  <a href="errata30.html">3.0</a>,
 <a href="#31">3.1</a>,  <a href="errata31.html">3.1</a>,
 <a href="#32">3.2</a>,  <a href="errata32.html">3.2</a>,
 <a href="#33">3.3</a>,  <a href="errata33.html">3.3</a>,
 <a href="#34">3.4</a>,  <a href="errata34.html">3.4</a>,
 <a href="#35">3.5</a>,  <a href="errata35.html">3.5</a>,
 <a href="#36">3.6</a>,  <a href="errata36.html">3.6</a>,
 <br>  <br>
 <a href="#37">3.7</a>,  <a href="errata37.html">3.7</a>,
 <a href="#38">3.8</a>,  <a href="errata38.html">3.8</a>,
 <a href="#39">3.9</a>,  <a href="errata39.html">3.9</a>,
 <a href="#40">4.0</a>,  <a href="errata40.html">4.0</a>,
 <a href="#41">4.1</a>,  <a href="errata41.html">4.1</a>,
 <a href="#42">4.2</a>,  <a href="errata42.html">4.2</a>,
 <a href="#43">4.3</a>,  <a href="errata43.html">4.3</a>,
 <a href="#44">4.4</a>,  <a href="errata44.html">4.4</a>,
 <a href="#45">4.5</a>,  <a href="errata45.html">4.5</a>,
 <a href="#46">4.6</a>,  <a href="errata46.html">4.6</a>,
 <a href="#47">4.7</a>,  <a href="errata47.html">4.7</a>,
 <a href="#48">4.8</a>,  <a href="errata48.html">4.8</a>,
 <a href="#49">4.9</a>,  <a href="errata49.html">4.9</a>,
 <a href="#50">5.0</a>,  <a href="errata50.html">5.0</a>,
 <a href="#51">5.1</a>,  <a href="errata51.html">5.1</a>,
 <a href="#52">5.2</a>,  <a href="errata52.html">5.2</a>,
 <a href="#53">5.3</a>,  <a href="errata53.html">5.3</a>,
 <br>  <br>
 <a href="#54">5.4</a>,  <a href="errata54.html">5.4</a>,
 <a href="#55">5.5</a>.  <a href="errata55.html">5.5</a>.
 <br>  <br>
 <hr>  <hr>
   
Line 220 
Line 220 
   
 <li><h3><font color="#e00000">Advisories</font></h3><p>  <li><h3><font color="#e00000">Advisories</font></h3><p>
   
 <li><a name="55"></a>  Please refer to the links at the top of this page.
 <h3><font color="#e00000">OpenBSD 5.5 Security Advisories</font></h3>  
 These are the OpenBSD 5.5 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
 <p>  
   
 <ul>  
 <li><a href="errata55.html#001_icmp">March 15, 2014:  
         Memory corruption happens during  
         ICMP reflection handling.  ICMP reflection is disabled by default.</a>  
 <li><a href="errata55.html#002_openssl">April 7, 2014:  
         Missing bounds checking in OpenSSL's implementation of the TLS/DTLS  
         heartbeat extension (RFC6520) which can result in a leak of memory contents.</a>  
 <li><a href="errata55.html#003_ftp">April 9, 2014: ftp(1) defect,  
         failure to check the server hostname when connecting to an https  
         website, allowing any trusted CA-signed certificate to impersonate  
         any other website.</a>  
 <li><a href="errata55.html#004_openssl">April 12, 2014:  
         A use-after-free race condition in OpenSSL's read buffer may permit  
         an attacker to inject data from one connection into another.</a>  
 <li><a href="errata55.html#005_openssl">May 1, 2014:  
         An attacker can trigger generation of an SSL alert which could  
         cause a null pointer dereference.</a>  
 <li><a href="errata55.html#006_libXfont">May 24, 2014:  
         X Font Service Protocol & Font metadata file handling issues  
         in libXfont.</a>  
 <li><a href="errata55.html#007_sendmail">June 5, 2014:  
         Sendmail was not properly closing file descriptions  
         before executing programs.</a>  
 <li><a href="errata55.html#008_openssl">June 6, 2014:  
         This patch contains a number of SSL library fixes.</a>  
 </ul>  
   
 <li><a name="54"></a>  
 <h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3>  
 These are the OpenBSD 5.4 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata54.html#002_sshgcm">November 7, 2013:  
         Memory corruption in post-authentication sshd process if AES-GCM cipher  
         is selected</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548">CVE-2013-4548</a>).  
 <li><a href="errata54.html#004_nginx">November 21, 2013:  
         Security restriction bypass in certain nginx(8) configurations</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>).  
 <li><a href="errata54.html#006_libXfont">January 10, 2014:  
         Buffer overflow in parsing of BDF font files</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>).  
 <li><a href="errata54.html#007_openssl">April 7, 2014:  
         Missing bounds checking in OpenSSL's implementation of the TLS/DTLS  
         heartbeat extension (RFC6520) which can result in a leak of memory contents.</a>  
 <li><a href="errata54.html#008_openssl">April 12, 2014:  
         A use-after-free race condition in OpenSSL's read buffer may permit  
         an attacker to inject data from one connection into another.</a>  
 <li><a href="errata54.html#009_openssl">May 1, 2014:  
         An attacker can trigger generation of an SSL alert which could  
         cause a null pointer dereference.</a>  
 <li><a href="errata54.html#010_libXfont">May 24, 2014:  
         X Font Service Protocol & Font metadata file handling issues  
         in libXfont.</a>  
 <li><a href="errata54.html#011_sendmail">June 5, 2014:  
         Sendmail was not properly closing file descriptions  
         before executing programs.</a>  
 <li><a href="errata54.html#012_openssl">June 6, 2014:  
         This patch contains a number of SSL library fixes.</a>  
 </ul>  
   
 <br><p><b>  
 OpenBSD 5.3 and earlier releases are not supported anymore. The following  
 paragraphs only list advisories issued while they were maintained; these  
 releases are likely to be affected by the advisories for more recent releases.  
 </b>  
 <p>  
   
 <li><a name="53"></a>  
 <h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3>  
 These are the OpenBSD 5.3 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata53.html#009_sshgcm">November 7, 2013:  
         Memory corruption in post-authentication sshd process if AES-GCM cipher  
         is selected</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548">CVE-2013-4548</a>).  
 <li><a href="errata53.html#011_nginx">November 21, 2013:  
         Security restriction bypass in certain nginx(8) configurations</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>).  
 <li><a href="errata53.html#013_libXfont">January 10, 2014:  
         Buffer overflow in parsing of BDF font files</a>  
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>).  
 <li><a href="errata53.html#014_openssl">April 7, 2014:  
         Missing bounds checking in OpenSSL's implementation of the TLS/DTLS  
         heartbeat extension (RFC6520) which can result in a leak of memory contents.</a>  
 <li><a href="errata54.html#015_openssl">April 12, 2014:  
         A use-after-free race condition in OpenSSL's read buffer may permit  
         an attacker to inject data from one connection into another.</a>  
 </ul>  
   
 <li>  
 <a name="52"></a>  
   
 <h3><font color="#e00000">OpenBSD 5.2 Security Advisories</font></h3>  
 These are the OpenBSD 5.2 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 None yet!  
 </ul>  
   
 <li>  
 <a name="51"></a>  
   
 <h3><font color="#e00000">OpenBSD 5.1 Security Advisories</font></h3>  
 These are the OpenBSD 5.1 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata51.html#001_libcrypto">April 23, 2012:  
         A heap overflow vulnerability has been found in libcrypto's ASN.1  
         parsing code</a> (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110">CVE-2012-2110</a>).  
 </ul>  
   
 <li>  
 <a name="50"></a>  
   
 <h3><font color="#e00000">OpenBSD 5.0 Security Advisories</font></h3>  
 These are the OpenBSD 5.0 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata50.html#002_libcrypto">April 23, 2012:  
         A heap overflow vulnerability has been found in libcrypto's ASN.1  
         parsing code</a> (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110">CVE-2012-2110</a>).  
 </ul>  
   
 <li>  
 <a name="49"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.9 Security Advisories</font></h3>  
 These are the OpenBSD 4.9 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 None yet!  
 </ul>  
   
 <li>  
 <a name="48"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.8 Security Advisories</font></h3>  
 These are the OpenBSD 4.8 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata48.html#009_pf">February 16, 2011:  
         PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were  
         not correctly handled on little-endian systems (alpha, amd64, arm, i386,  
         mips64el, vax). Other address types (bare addresses "10.1.1.1" and  
         prefixes "10.1.1.1/30") are not affected.</a>  
 <li><a href="errata48.html#008_openssl">February 11, 2011:  
         An incorrectly formatted ClientHello handshake message could cause  
         OpenSSL to parse past the end of the message.  An attacker could use  
         this flaw to trigger an invalid memory access, causing a crash of an  
         application linked to OpenSSL.  As well, certain applications may expose  
         the contents of parsed OCSP extensions, specifically the OCSP nonce  
         extension.  
 <br>  
         Applications are only affected if they act as a server and call  
         SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.  It is believed  
         that nothing in the base OS uses this.  Apache httpd started using this  
         in v2.3.3; this is newer than the version in ports.</a>  
 <li><a href="errata48.html#005_pf">December 17, 2010:  
         Insufficent initialization of the pf rule structure in the ioctl  
         handler may allow userland to modify kernel memory. By default root  
         privileges are needed to add or modify pf rules.</a>  
 </ul>  
   
 <li>  
 <a name="47"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.7 Security Advisories</font></h3>  
 These are the OpenBSD 4.7 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata47.html#013_pf">February 16, 2011:  
         PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were  
         not correctly handled on little-endian systems (alpha, amd64, arm, i386,  
         mips64el, vax). Other address types (bare addresses "10.1.1.1" and  
         prefixes "10.1.1.1/30") are not affected.</a>  
 <li><a href="errata47.html#012_openssl">February 11, 2011:  
         An incorrectly formatted ClientHello handshake message could cause  
         OpenSSL to parse past the end of the message.  An attacker could use  
         this flaw to trigger an invalid memory access, causing a crash of an  
         application linked to OpenSSL.  As well, certain applications may expose  
         the contents of parsed OCSP extensions, specifically the OCSP nonce  
         extension.  
 <br>  
         Applications are only affected if they act as a server and call  
         SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.  It is believed  
         that nothing in the base OS uses this.  Apache httpd started using this  
         in v2.3.3; this is newer than the version in ports.</a>  
 <li><a href="errata47.html#009_pf">December 17, 2010:  
         Insufficent initialization of the pf rule structure in the ioctl  
         handler may allow userland to modify kernel memory. By default root  
         privileges are needed to add or modify pf rules.</a>  
 <li><a href="errata47.html#004_pfsync">April 23, 2010:  
         The combination of pfsync and IPSEC may crash the kernel.</a>  
 <li><a href="errata47.html#003_openssl">April 14, 2010:  
         In TLS connections, certain incorrectly formatted records can  
         cause an OpenSSL client or server to crash due to a read  
         attempt at NULL.</a>  
 </ul>  
   
 <li>  
 <a name="46"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.6 Security Advisories</font></h3>  
 These are the OpenBSD 4.6 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata46.html#010_openssl">April 14, 2010:  
         In TLS connections, certain incorrectly formatted records can  
         cause an OpenSSL client or server to crash due to a read  
         attempt at NULL.</a>  
 <li><a href="errata46.html#006_openssl">March 12, 2010:  
         OpenSSL is susceptible to a buffer overflow due to a failure  
         to check for NULL returns from bn_wexpand function calls.</a>  
 <li><a href="errata46.html#004_openssl">November 26, 2009:  
         The SSL/TLS protocol is subject to man-in-the-middle attacks  
         related to renegotiation.</a>  
 </ul>  
   
 <li>  
 <a name="45"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.5 Security Advisories</font></h3>  
 These are the OpenBSD 4.5 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata45.html#016_openssl">April 14, 2010:  
         In TLS connections, certain incorrectly formatted records can  
         cause an OpenSSL client or server to crash due to a read  
         attempt at NULL.</a>  
 <li><a href="errata45.html#012_openssl">March 12, 2010:  
         OpenSSL is susceptible to a buffer overflow due to a failure  
         to check for NULL returns from bn_wexpand function calls.</a>  
 <li><a href="errata45.html#010_openssl">November 26, 2009:  
         The SSL/TLS protocol is subject to man-in-the-middle attacks  
         related to renegotiation.</a>  
 </ul>  
   
 <li>  
 <a name="44"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.4 Security Advisories</font></h3>  
 These are the OpenBSD 4.4 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata44.html#011_sudo">February 22, 2009:  
         sudo(8) may allow a user listed in sudoers to run a command  
         as a different user than their access rule specifies when a Unix  
         group is used in the RunAs portion of the rule.</a>  
 <li><a href="errata44.html#008_bind">January 15, 2009:  
         named(8) suffered from a similar logic error that may allow  
         bypass of DSA DNSSEC signature validation.</a>  
 <li><a href="errata44.html#007_openssl">January 9, 2009:  
         OpenSSL suffered from some logic errors that allowed bypass  
         of DSA/ECDSA certificate validation.</a>  
 <li><a href="errata44.html#001_ndp">November 2, 2008:  
         The Neighbor Discovery Protocol (ndp) did not correctly verify  
         neighbor solicitation requests maybe allowing a nearby attacker  
         to intercept traffic.</a>  
 </ul>  
   
 <li>  
 <a name="43"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.3 Security Advisories</font></h3>  
 These are the OpenBSD 4.3 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata43.html#011_sudo">February 22, 2009:  
         sudo(8) may allow a user listed in sudoers to run a command  
         as a different user than their access rule specifies when a Unix  
         group is used in the RunAs portion of the rule.</a>  
 <li><a href="errata43.html#008_bind">January 15, 2009:  
         named(8) suffered from a similar logic error that may allow  
         bypass of DSA DNSSEC signature validation.</a>  
 <li><a href="errata43.html#007_openssl">January 9, 2009:  
         OpenSSL suffered from some logic errors that allowed bypass  
         of DSA/ECDSA certificate validation.</a>  
 <li><a href="errata43.html#006_ndp">October 2, 2008:  
         The Neighbor Discovery Protocol (ndp) did not correctly verify  
         neighbor solicitation requests maybe allowing a nearby attacker  
         to intercept traffic.</a>  
 <li><a href="errata43.html#004_bind">July 23, 2008:  
         A vulnerability has been found with BIND.</a>  
 <li><a href="errata43.html#003_xorg">July 15, 2008:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata43.html#002_openssh2">April 3, 2008:  
         sshd(8) could possibly allow hijacking of X11-forwarded connections.</a>  
 <li><a href="errata43.html#001_openssh">March 30, 2008:  
         sshd(8) could allow arbitrary commands to be executed via ~/.ssh/rc  
         when a sshd_config(5) ForceCommand directive was in effect.</a>  
 </ul>  
   
 <li>  
 <a name="42"></a>  
 <h3><font color="#e00000">OpenBSD 4.2 Security Advisories</font></h3>  
 These are the OpenBSD 4.2 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata42.html#015_ndp">October 2, 2008:  
         The Neighbor Discovery Protocol (ndp) did not correctly verify  
         neighbor solicitation requests maybe allowing a nearby attacker  
         to intercept traffic.</a>  
 <li><a href="errata42.html#013_bind">July 23, 2008:  
         A vulnerability has been found with BIND.</a>  
 <li><a href="errata42.html#012_xorg2">July 15, 2008:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata42.html#011_openssh2">April 3, 2008:  
         sshd(8) could possibly allow hijacking of X11-forwarded connections.</a>  
 <li><a href="errata42.html#010_openssh">March 30, 2008:  
         sshd(8) could allow arbitrary commands to be executed via ~/.ssh/rc  
         when a sshd_config(5) ForceCommand directive was in effect.</a>  
 <li><a href="errata42.html#009_ppp">March 7, 2008:  
         Command prompt parsing buffer overflow in ppp.</a>  
 <li><a href="errata42.html#006_xorg">Feb 8, 2008:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata42.html#002_openssl">Oct 10, 2007:  
         Fix off-by-one overflow in OpenSSL.</a>  
 <li><a href="errata42.html#001_dhcpd">Oct 9, 2007:  
         Fix stack corruption problem in dhcpd(8).</a>  
 </ul>  
   
 <li>  
 <a name="41"></a>  
   
 <h3><font color="#e00000">OpenBSD 4.1 Security Advisories</font></h3>  
 These are the OpenBSD 4.1 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata41.html#016_openssh2">April 3, 2008:  
         sshd(8) could possibly allow hijacking of X11-forwarded connections.</a>  
 <li><a href="errata41.html#015_openssh">March 30, 2008:  
         sshd(8) could allow arbitrary commands to be executed via ~/.ssh/rc  
         when a sshd_config(5) ForceCommand directive was in effect.</a>  
 <li><a href="errata41.html#014_ppp">March 7, 2008:  
         Command prompt parsing buffer overflow in ppp.</a>  
 <li><a href="errata41.html#012_xorg">Feb 8, 2008:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata41.html#011_openssl">Oct 10, 2007:  
         The SSL_get_shared_ciphers() function in OpenSSL contains  
         an off-by-one overflow.</a>  
 <li><a href="errata41.html#010_dhcpd">Oct 9, 2007:  
         Fix stack corruption problem in dhcpd(8).</a>  
 <li><a href="errata41.html#009_file">Jul 9, 2007:  
         Fix possible heap overflow in file(1).</a>  
 <li><a href="errata41.html#005_route6">Apr 27, 2007:  
         IPv6 type 0 route headers can be used to mount a DoS attack  
         against hosts and networks.</a>  
 <li><a href="errata41.html#004_xorg">Apr 27, 2007:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata41.html#001_mbuf">Apr 27, 2007:  
         Incorrect mbuf handling for ICMP6 packets.</a>  
 </ul>  
   
 <li>  
 <a name="40"></a>  
 <h3><font color="#e00000">OpenBSD 4.0 Security Advisories</font></h3>  
 These are the OpenBSD 4.0 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata40.html#017_openssl">Oct 10, 2007:  
         The SSL_get_shared_ciphers() function in OpenSSL contains an  
         off-by-one overflow.</a>  
 <li><a href="errata40.html#016_dhcpd">Oct 9, 2007:  
         Fix stack corruption problem in dhcpd(8).</a>  
 <li><a href="errata40.html#015_file">Jul 9, 2007:  
         Fix possible heap overflow in file(1).</a>  
 <li><a href="errata40.html#012_route6">Apr 23, 2007:  
         IPv6 type 0 route headers can be used to mount a DoS attack  
         against hosts and networks.</a>  
 <li><a href="errata40.html#011_xorg">Apr 4, 2007:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata40.html#m_dup1">Mar 7, 2007:  
         Incorrect mbuf handling for ICMP6 packets.</a>  
 <li><a href="errata40.html#agp">Jan 3, 2007:  
         Insufficient validation in vga(4) may allow an attacker to gain  
         root privileges on some i386 systems.</a>  
 <li><a href="errata40.html#ldso">Nov 19, 2006:  
         ld.so(1) fails to properly sanitize the environment.</a>  
 <li><a href="errata40.html#systrace">Nov 4, 2006:  
         Fix for an integer overflow in systrace(4)'s STRIOCREPLACE support,  
         found by Chris Evans.</a>  
 <li><a href="errata40.html#openssl">Nov 4, 2006:  
         Several problems have been found in OpenSSL.</a>  
 <li><a href="errata40.html#httpd">Nov 4, 2006:  
         httpd(8) does not sanitize the Expect header from an HTTP request  
         when it is reflected back in an error message, which might allow  
         cross-site scripting (XSS) style attacks.</a>  
 </ul>  
   
 <li>  
 <a name="39"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.9 Security Advisories</font></h3>  
 These are the OpenBSD 3.9 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata39.html#022_route6">Apr 23, 2007:  
         IPv6 type 0 route headers can be used to mount a DoS attack  
         against hosts and networks.</a>  
 <li><a href="errata39.html#021_xorg">Apr 4, 2007:  
         Multiple vulnerabilities in X.Org.</a>  
 <li><a href="errata39.html#m_dup1">Mar 7, 2007:  
         Incorrect mbuf handling for ICMP6 packets.</a>  
 <li><a href="errata39.html#agp">Jan 3, 2007:  
         Insufficient validation in vga(4) may allow an attacker to gain  
         root privileges on some i386 systems.</a>  
 <li><a href="errata39.html#ldso">Nov 19, 2006:  
         ld.so(1) fails to properly sanitize the environment.</a>  
 <li><a href="errata39.html#ssh">Oct 12, 2006:  
         Fix 2 security bugs found in OpenSSH.</a>  
 <li><a href="errata39.html#systrace">Oct 7, 2006:  
         Fix for an integer overflow in systrace(4)'s STRIOCREPLACE support,  
         found by Chris Evans.</a>  
 <li><a href="errata39.html#openssl2">Oct 7, 2006:  
         Several problems have been found in OpenSSL.</a>  
 <li><a href="errata39.html#httpd2">Oct 7, 2006:  
         httpd(8) does not sanitize the Expect header from an HTTP request  
         when it is reflected back in an error message, which might allow  
         cross-site scripting (XSS) style attacks.</a>  
 <li><a href="errata39.html#openssl">Sep 8, 2006:  
         Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is  
         possible for an attacker to construct an invalid signature which  
         OpenSSL would accept as a valid PKCS#1 v1.5 signature.</a>  
 <li><a href="errata39.html#bind">Sep 8, 2006:  
         Two Denial of Service issues have been found with BIND.</a>  
 <li><a href="errata39.html#sppp">Sep 2, 2006:  
         Due to the failure to correctly validate LCP configuration option  
         lengths, it is possible for an attacker to send LCP packets via an  
         sppp(4) connection causing the kernel to panic.</a>  
 <li><a href="errata39.html#isakmpd">Aug 25, 2006:  
         A problem in isakmpd(8) caused IPsec to run partly without replay  
         protection.</a>  
 <li><a href="errata39.html#sem">Aug 25, 2006:  
         It is possible to cause the kernel to panic when more than the default  
         number of sempahores have been allocated.</a>  
 <li><a href="errata39.html#dhcpd">Aug 25, 2006:  
         Due to an off-by-one error in dhcpd(8) it is possible to cause dhcpd(8)  
         to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier  
         option.</a>  
 <li><a href="errata39.html#sendmail3">Aug 25, 2006:  
         A potential denial of service problem has been found in sendmail.</a>  
 <li><a href="errata39.html#httpd">Jul 30, 2006:  
         httpd(8)'s mod_rewrite has a potentially exploitable off-by-one buffer  
         overflow.</a>  
 <li><a href="errata39.html#sendmail2">Jun 15, 2006:  
         A potential denial of service problem has been found in sendmail.</a>  
 <li><a href="errata39.html#xorg">May 2, 2006:  
         A buffer overflow exists in the Render extension of the X server.</a>  
 <li><a href="errata39.html#sendmail">Mar 25, 2006:  
         A race condition has been reported to exist in the handling by sendmail  
         of asynchronous signals.</a>  
 </ul>  
   
 <li>  
 <a name="38"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.8 Security Advisories</font></h3>  
 These are the OpenBSD 3.8 advisories -- all these problems are solved  
 in <a href=anoncvs.html>OpenBSD current</a> and the  
 <a href=stable.html>patch branch</a>.  
   
 <p>  
 <ul>  
 <li><a href="errata38.html#ssh2">Oct 12, 2006:  
         Fix 2 security bugs found in OpenSSH.</a>  
 <li><a href="errata38.html#systrace">Oct 7, 2006:  
         Fix for an integer overflow in systrace(4)'s STRIOCREPLACE support,  
         found by Chris Evans.</a>  
 <li><a href="errata38.html#openssl2">Oct 7, 2006:  
         Several problems have been found in OpenSSL.</a>  
 <li><a href="errata38.html#httpd2">Oct 7, 2006:  
         httpd(8) does not sanitize the Expect header from an HTTP request  
         when it is reflected back in an error message, which might allow  
         cross-site scripting (XSS) style attacks.</a>  
 <li><a href="errata38.html#openssl">Sep 8, 2006:  
         Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is  
         possible for an attacker to construct an invalid signature which  
         OpenSSL would accept as a valid PKCS#1 v1.5 signature.</a>  
 <li><a href="errata38.html#bind">Sep 8, 2006:  
         Two Denial of Service issues have been found with BIND.</a>  
 <li><a href="errata38.html#sppp">Sep 2, 2006:  
         Due to the failure to correctly validate LCP configuration option  
         lengths, it is possible for an attacker to send LCP packets via an  
         sppp(4) connection causing the kernel to panic.</a>  
 <li><a href="errata38.html#isakmpd">Aug 25, 2006:  
         A problem in isakmpd(8) caused IPsec to run partly without replay  
         protection.</a>  
 <li><a href="errata38.html#sem">Aug 25, 2006:  
         It is possible to cause the kernel to panic when more than the default  
         number of sempahores have been allocated.</a>  
 <li><a href="errata38.html#dhcpd">Aug 25, 2006:  
         Due to an off-by-one error in dhcpd(8) it is possible to cause dhcpd(8)  
         to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier  
         option.</a>  
 <li><a href="errata38.html#sendmail3">Aug 25, 2006:  
         A potential denial of service problem has been found in sendmail.</a>  
 <li><a href="errata38.html#httpd">Jul 30, 2006:  
         httpd(8)'s mod_rewrite has a potentially exploitable off-by-one buffer  
         overflow.</a>  
 <li><a href="errata38.html#sendmail2">Jun 15, 2006:  
         A potential denial of service problem has been found in sendmail.</a>  
 <li><a href="errata38.html#xorg">May 2, 2006:  
         A buffer overflow exists in the Render extension of the X server.</a>  
 <li><a href="errata38.html#sendmail">Mar 25, 2006:  
         A race condition has been reported to exist in the handling by sendmail  
         of asynchronous signals.</a>  
 <li><a href="errata38.html#ssh">Feb 12, 2006:  
         Josh Bressers has reported a weakness in OpenSSH caused due to the  
         insecure use of the system(3) function in scp(1) when performing copy  
         operations using filenames that are supplied by the user from the  
         command line.</a>  
 <li><a href="errata38.html#fd">Jan 5, 2006:  
         Do not allow users to trick suid programs into re-opening files via  
         /dev/fd.</a>  
 <li><a href="errata38.html#perl">Jan 5, 2006:  
         A buffer overflow has been found in the Perl interpreter with the  
         sprintf function which may be exploitable under certain conditions.</a>  
 </ul>  
   
 <li>  
 <a name="37"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.7 Security Advisories</font></h3>  
 These are the OpenBSD 3.7 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.7 is no longer being maintained,  
 you should update your machine.  
   
 <p>  
 <ul>  
 <li><a href="errata37.html#xorg">May 2, 2006:  
         A buffer overflow exists in the Render extension of the X server.</a>  
 <li><a href="errata37.html#sendmail">Mar 25, 2006:  
         A race condition has been reported to exist in the handling by sendmail  
         of asynchronous signals.</a>  
 <li><a href="errata37.html#ssh">Feb 12, 2006:  
         Josh Bressers has reported a weakness in OpenSSH caused due to the  
         insecure use of the system(3) function in scp(1) when performing copy  
         operations using filenames that are supplied by the user from the  
         command line.</a>  
 <li><a href="errata37.html#fd">Jan 5, 2006:  
         Do not allow users to trick suid programs into re-opening files via  
         /dev/fd.</a>  
 <li><a href="errata37.html#perl">Jan 5, 2006:  
         A buffer overflow has been found in the Perl interpreter with the  
         sprintf function which may be exploitable under certain conditions.</a>  
 <li><a href="errata37.html#libz2">Jul 21, 2005:  
         Fix another buffer overflow in the zlib library that may be exploitable.</a>  
 <li><a href="errata37.html#libz">Jul 6, 2005:  
         Fix a buffer overflow in the zlib library that may be exploitable.</a>  
 <li><a href="errata37.html#sudo">Jun 20, 2005:  
         Fix a race condition in sudo(8) that could allow a user  
         to run arbitrary commands.</a>  
 <li><a href="errata37.html#cvs">Jun 7, 2005:  
         Fix a buffer overflow, memory leaks, and NULL pointer  
         dereference in cvs(1).</a>  
 </ul>  
   
 <li>  
 <a name="36"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.6 Security Advisories</font></h3>  
 These are the OpenBSD 3.6 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.6 is no longer being maintained,  
 you should update your machine.  
   
 <p>  
 <ul>  
 <li><a href="errata36.html#libz2">Jul 21, 2005:  
         Fix another buffer overflow in the zlib library that may be exploitable.</a>  
 <li><a href="errata36.html#libz">Jul 6, 2005:  
         Fix a buffer overflow in the zlib library that may be exploitable.</a>  
 <li><a href="errata36.html#sudo">Jun 20, 2005:  
         Fix a race condition in sudo(8) that could allow a user  
         to run arbitrary commands.</a>  
 <li><a href="errata36.html#cvs">Apr 28, 2005:  
         Fix a buffer overflow, memory leaks, and NULL pointer  
         dereference in cvs(1).</a>  
 <li><a href="errata36.html#telnet">Mar 30, 2005:  
         Due to buffer overflows in telnet(1), a malicious  
         server or man-in-the-middle attack could allow  
         execution of arbitrary code with the privileges of  
         the user invoking telnet(1).</a>  
 <li><a href="errata36.html#copy">Mar 16, 2005:  
         More stringent checking should be done in the copy(9)  
         functions to prevent their misuse.</a>  
 <li><a href="errata36.html#locore">Feb 28, 2005:  
         More stringent checking should be done in the copy(9)  
         functions to prevent their misuse.</a>  
 <li><a href="errata36.html#httpd">Jan 12, 2005:  
         httpd(8)'s mod_include module fails to properly validate  
         the length of user supplied tag strings prior to copying  
         them to a local buffer, causing a buffer overflow.</a>  
 <li><a href="errata36.html#pfkey">Dec 14, 2004:  
         On systems running isakmpd(8) it is possible for a local  
         user to cause kernel memory corruption and system panic by  
         setting ipsec(4) credentials on a socket.</a>  
 </ul>  
   
 <li>  
 <a name="35"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.5 Security Advisories</font></h3>  
 These are the OpenBSD 3.5 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.5 is no longer being maintained,  
 you should update your machine.  
   
 <p>  
 <ul>  
 <li><a href="errata35.html#cvs4">Apr 28, 2005:  
         Fix a buffer overflow, memory leaks, and NULL pointer  
         dereference in cvs(1).</a>  
 <li><a href="errata35.html#telnet">Mar 30, 2005:  
         Due to buffer overflows in telnet(1), a malicious  
         server or man-in-the-middle attack could allow  
         execution of arbitrary code with the privileges of  
         the user invoking telnet(1).</a>  
 <li><a href="errata35.html#copy">Mar 16, 2005:  
         More stringent checking should be done in the copy(9)  
         functions to prevent their misuse.</a>  
 <li><a href="errata35.html#locore">Feb 28, 2005:  
         More stringent checking should be done in the copy(9)  
         functions to prevent their misuse.</a>  
 <li><a href="errata35.html#httpd3">Jan 12, 2005:  
         httpd(8)'s mod_include module fails to properly validate  
         the length of user supplied tag strings prior to copying  
         them to a local buffer, causing a buffer overflow.</a>  
 <li><a href="errata35.html#pfkey">Dec 14, 2004:  
         On systems running isakmpd(8) it is possible for a local  
         user to cause kernel memory corruption and system panic by  
         setting ipsec(4) credentials on a socket.</a>  
 <li><a href="errata35.html#radius">Sep 20, 2004:  
         Radius-based authentication is vulnerable to spoofed replies.</a>  
 <li><a href="errata35.html#xpm">Sep 16, 2004:  
         The Xpm library has vulnerabilities when parsing malicious images.</a>  
 <li><a href="errata35.html#httpd2"> Sep 10, 2004:  
         httpd(8)'s mod_rewrite module can be made to write one zero byte in  
         an arbitrary memory position outside of a char array, causing a DoS  
         or possibly buffer overflows.</a>  
 <li><a href="errata35.html#httpd"> Jun 12, 2004:  
         Multiple vulnerabilities have been found in httpd(8) / mod_ssl.</a>  
 <li><a href="errata35.html#isakmpd"> Jun 10, 2004:  
         isakmpd(8) still has issues with unauthorized SA deletion,  
         an attacker can delete IPsec tunnels at will.</a>  
 <li><a href="errata35.html#cvs3"> Jun 9, 2004:  
         Multiple remote vulnerabilities have been found in the cvs(1)  
         server which can be used by CVS clients to crash or execute  
         arbitrary code on the server.</a>  
 <li><a href="errata35.html#kerberos"> May 30, 2004:  
         kdc(8) performs inadequate checking of request fields, leading  
         to the possibility of principal impersonation from other  
         Kerberos realms if they are trusted with a cross-realm trust.</a>  
 <li><a href="errata35.html#xdm"> May 26, 2004:  
         xdm(1) ignores the requestPort resource and creates a  
         listening socket regardless of the setting in xdm-config.</a>  
 <li><a href="errata35.html#cvs2"> May 20, 2004:  
         A buffer overflow in the cvs(1) server has been found,  
         which can be used by CVS clients to execute arbitrary code on  
         the server.</a>  
 <li><a href="errata35.html#procfs"> May 13, 2004:  
         Integer overflow problems were found in procfs, allowing  
         reading of arbitrary kernel memory.</a>  
 <li><a href="errata35.html#cvs"> May 5, 2004:  
         Pathname validation problems have been found in cvs(1),  
         allowing clients and servers access to files outside the  
         repository or local CVS tree.</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="34"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.4 Security Advisories</font></h3>  
 These are the OpenBSD 3.4 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.4 is no longer being maintained,  
 you should update your machine.  
 <p>  
 <ul>  
 <li><a href="errata34.html#pfkey">Dec 14, 2004:  
         On systems running isakmpd(8) it is possible for a local  
         user to cause kernel memory corruption and system panic by  
         setting ipsec(4) credentials on a socket.</a>  
 <li><a href="errata34.html#xpm">Sep 16, 2004:  
         The Xpm library has vulnerabilities when parsing malicious images.</a>  
 <li><a href="errata34.html#httpd4"> Sep 10, 2004:  
         httpd(8)'s mod_rewrite module can be made to write one zero byte in  
         an arbitrary memory position outside of a char array, causing a DoS  
         or possibly buffer overflows.</a>  
 <li><a href="errata34.html#httpd3"> Jun 12, 2004:  
         Multiple vulnerabilities have been found in httpd(8) / mod_ssl.</a>  
 <li><a href="errata34.html#isakmpd3"> Jun 10, 2004:  
         isakmpd(8) still has issues with unauthorized SA deletion,  
         an attacker can delete IPsec tunnels at will.</a>  
 <li><a href="errata34.html#cvs3"> Jun 9, 2004:  
         Multiple remote vulnerabilities have been found in the cvs(1)  
         server which can be used by CVS clients to crash or execute  
         arbitrary code on the server.</a>  
 <li><a href="errata34.html#kerberos"> May 30, 2004:  
         kdc(8) performs inadequate checking of request fields, leading  
         to the possibility of principal impersonation from other  
         Kerberos realms if they are trusted with a cross-realm trust.</a>  
 <li><a href="errata34.html#cvs2"> May 20, 2004:  
         A buffer overflow in the cvs(1) server has been found,  
         which can be used by CVS clients to execute arbitrary code on  
         the server.</a>  
 <li><a href="errata34.html#procfs"> May 13, 2004:  
         Integer overflow problems were found in procfs, allowing  
         reading of arbitrary kernel memory.</a>  
 <li><a href="errata34.html#cvs"> May 5, 2004:  
         Pathname validation problems have been found in cvs(1),  
         allowing clients and servers access to files outside the  
         repository or local CVS tree.</a>  
 <li><a href="errata34.html#openssl"> March 17, 2004:  
         A missing check for a NULL-pointer dereference may allow a  
         remote attacker to crash applications using OpenSSL.</a>  
 <li><a href="errata34.html#isakmpd2"> March 17, 2004:  
         Defects in the payload validation and processing functions of  
         isakmpd have been discovered. An attacker could send malformed  
         ISAKMP messages and cause isakmpd to crash or to loop endlessly.</a>  
 <li><a href="errata34.html#httpd2"> March 13, 2004:  
         Due to a bug in the parsing of Allow/Deny rules for httpd(8)'s  
         access module, using IP addresses without a netmask on big endian  
         64-bit platforms causes the rules to fail to match.</a>  
 <li><a href="errata34.html#ip6"> February 8, 2004:  
         An IPv6 MTU handling problem exists that could be used by an  
         attacker to cause a denial of service attack.</a>  
 <li><a href="errata34.html#sysvshm"> February 5, 2004:  
         A reference counting bug in shmat(2) could be used to write to  
         kernel memory under certain circumstances.</a>  
 <li><a href="errata34.html#isakmpd">January 13, 2004:  
         Several message handling flaws in isakmpd(8) have been reported  
         by Thomas Walpuski.</a>  
 <li><a href="errata34.html#ibcs2">November 17, 2003:  
         It may be possible for a local user to overrun the stack in  
         compat_ibcs2(8) and cause a kernel panic.</a>  
 <li><a href="errata34.html#asn1">November 1, 2003:  
         The use of certain ASN.1 encodings or malformed public keys may  
         allow an attacker to mount a denial of service attack against  
         applications linked with ssl(3).</a>  
 </ul>  
   
 <li>  
 <a name="33"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.3 Security Advisories</font></h3>  
 These are the OpenBSD 3.3 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.3 is no longer being maintained,  
 you should update your machine.  
 <p>  
 <ul>  
 <li><a href="errata33.html#cvs"> May 5, 2004:  
         Pathname validation problems have been found in cvs(1),  
         allowing clients and servers access to files outside the  
         repository or local CVS tree.</a>  
 <li><a href="errata33.html#openssl"> March 17, 2004:  
         A missing check for a NULL-pointer dereference may allow a  
         remote attacker to crash applications using OpenSSL.</a>  
 <li><a href="errata33.html#isakmpd2"> March 17, 2004:  
         Defects in the payload validation and processing functions of  
         isakmpd have been discovered. An attacker could send malformed  
         ISAKMP messages and cause isakmpd to crash or to loop endlessly.</a>  
 <li><a href="errata33.html#httpd2"> March 13, 2004:  
         Due to a bug in the parsing of Allow/Deny rules for httpd(8)'s  
         access module, using IP addresses without a netmask on big endian  
         64-bit platforms causes the rules to fail to match.</a>  
 <li><a href="errata33.html#ip6"> February 8, 2004:  
         An IPv6 MTU handling problem exists that could be used by an  
         attacker to cause a denial of service attack.</a>  
 <li><a href="errata33.html#sysvshm"> February 5, 2004:  
         A reference counting bug in shmat(2) could be used to write to  
         kernel memory under certain circumstances.</a>  
 <li><a href="errata33.html#isakmpd">January 15, 2004:  
         Several message handling flaws in isakmpd(8) have been reported  
         by Thomas Walpuski.</a>  
 <li><a href="errata33.html#ibcs2">November 17, 2003:  
         It may be possible for a local user to execute arbitrary code  
         resulting in escalation of privileges due to a stack overrun  
         in compat_ibcs2(8).</a>  
 <li><a href="errata33.html#asn1">October 1, 2003:  
         The use of certain ASN.1 encodings or malformed public keys may  
         allow an attacker to mount a denial of service attack against  
         applications linked with ssl(3).</a>  
 <li><a href="errata33.html#pfnorm">September 24, 2003:  
         Access of freed memory in pf(4) could be used to  
         remotely panic a machine using scrub rules.</a>  
 <li><a href="errata33.html#sendmail">September 17, 2003:  
         A buffer overflow in the address parsing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata33.html#sshbuffer">September 16, 2003:  
         OpenSSH versions prior to 3.7 contains a buffer management error  
         that is potentially exploitable.</a>  
 <li><a href="errata33.html#sysvsem">September 10, 2003:  
         Root may be able to reduce the security level by taking advantage of  
         an integer overflow when the semaphore limits are made very large.</a>  
 <li><a href="errata33.html#semget">August 20, 2003:  
         An improper bounds check in the kernel may allow a local user  
         to panic the kernel.</a>  
 <li><a href="errata33.html#realpath">August 4, 2003:  
         An off-by-one error exists in the C library function realpath(3)  
         may allow an attacker to gain escalated privileges.</a>  
 </ul>  
   
   
 <p>  
 <li>  
 <a name="32"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.2 Security Advisories</font></h3>  
 These are the OpenBSD 3.2 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.2 is no longer being maintained,  
 you should update your machine.  
 <p>  
 <ul>  
 <li><a href="errata32.html#asn1">October 1, 2003:  
         The use of certain ASN.1 encodings or malformed public keys may  
         allow an attacker to mount a denial of service attack against  
         applications linked with ssl(3).  This does not affect OpenSSH.</a>  
 <li><a href="errata32.html#pfnorm">September 24, 2003:  
         Access of freed memory in pf(4) could be used to  
         remotely panic a machine using scrub rules.</a>  
 <li><a href="errata32.html#sendmail4">September 17, 2003:  
         A buffer overflow in the address parsing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata32.html#sshbuffer">September 16, 2003:  
         OpenSSH versions prior to 3.7 contains a buffer management error  
         that is potentially exploitable.</a>  
 <li><a href="errata32.html#sendmail3">August 25, 2003:  
         Fix for a potential security issue in  
         sendmail(8) with respect to DNS maps.</a>  
 <li><a href="errata32.html#realpath">August 4, 2003:  
         An off-by-one error exists in the C library function realpath(3)  
         may allow an attacker to gain escalated privileges.</a>  
 <li><a href="errata32.html#sendmail2">March 31, 2003:  
         A buffer overflow in the address parsing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata32.html#kerberos">March 24, 2003:  
         A cryptographic weaknesses in the Kerberos v4 protocol can be  
         exploited on Kerberos v5 as well.</a>  
 <li><a href="errata32.html#kpr">March 19, 2003:  
         OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack  
         designed by Czech researchers Klima, Pokorny and Rosa.</a>  
 <li><a href="errata32.html#blinding">March 18, 2003:  
         Various SSL and TLS operations in OpenSSL are vulnerable to  
         timing attacks.</a>  
 <li><a href="errata32.html#lprm">March 5, 2003:  
         A buffer overflow in lprm(1) may allow an attacker to elevate  
         privileges to user daemon.</a>  
 <li><a href="errata32.html#sendmail">March 3, 2003:  
         A buffer overflow in the envelope comments processing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata32.html#httpd">February 25, 2003:  
         httpd(8) leaks file inode numbers via ETag header as well as  
         child PIDs in multipart MIME boundary generation. This could  
         lead, for example, to NFS exploitation because it uses inode  
         numbers as part of the file handle.</a>  
 <li><a href="errata32.html#ssl">February 22, 2003:  
         In ssl(8) an information leak can occur via timing by performing  
         a MAC computation even if incorrect block cipher padding has  
         been found, this is a countermeasure. Also, check for negative  
         sizes, in allocation routines.</a>  
 <li><a href="errata32.html#cvs">January 20, 2003:  
         A double free exists in cvs(1) that could lead to privilege  
         escalation for cvs configurations where the cvs command is  
         run as a privileged user.</a>  
 <li><a href="errata32.html#named">November 14, 2002:  
         A buffer overflow exists in named(8) that could lead to a  
         remote crash or code execution as user named in a chroot jail.</a>  
 <li><a href="errata32.html#pool">November 6, 2002:  
         A logic error in the pool kernel memory allocator could cause  
         memory corruption in low-memory situations, causing the system  
         to crash.</a>  
 <li><a href="errata32.html#smrsh">November 6, 2002:  
         An attacker can bypass smrsh(8)'s restrictions and execute  
         arbitrary commands with the privileges of his own account.</a>  
 <li><a href="errata32.html#pfbridge">November 6, 2002:  
         Network bridges running pf with scrubbing enabled could cause  
         mbuf corruption, causing the system to crash.</a>  
 <li><a href="errata32.html#kadmin">October 21, 2002:  
         A buffer overflow can occur in the kadmind(8) daemon, leading  
         to possible remote crash or exploit.</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="31"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.1 Security Advisories</font></h3>  
 These are the OpenBSD 3.1 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.1 is no longer being maintained,  
 you should update your machine.  
   
 <p>  
 <ul>  
 <li><a href="errata31.html#sendmail2">March 31, 2003:  
         A buffer overflow in the address parsing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata31.html#kerberos">March 24, 2003:  
         A cryptographic weaknesses in the Kerberos v4 protocol can be  
         exploited on Kerberos v5 as well.</a>  
 <li><a href="errata31.html#kpr">March 19, 2003:  
         OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack  
         designed by Czech researchers Klima, Pokorny and Rosa.</a>  
 <li><a href="errata31.html#blinding">March 18, 2003:  
         Various SSL and TLS operations in OpenSSL are vulnerable to  
         timing attacks.</a>  
 <li><a href="errata31.html#lprm">March 4, 2003:  
         A buffer overflow in lprm(1) may allow an attacker to gain  
         root privileges.</a>  
 <li><a href="errata31.html#sendmail">March 3, 2003:  
         A buffer overflow in the envelope comments processing in  
         sendmail(8) may allow an attacker to gain root privileges.</a>  
 <li><a href="errata31.html#ssl2">February 23, 2003:  
         In ssl(8) an information leak can occur via timing by performing  
         a MAC computation even if incorrect block cipher padding has  
         been found, this is a countermeasure. Also, check for negative  
         sizes, in allocation routines.</a>  
 <li><a href="errata31.html#cvs">January 20, 2003:  
         A double free exists in cvs(1) that could lead to privilege  
         escalation for cvs configurations where the cvs command is  
         run as a privileged user.</a>  
 <li><a href="errata31.html#named">November 14, 2002:  
         A buffer overflow exists in named(8) that could lead to a  
         remote crash or code execution as user named in a chroot jail.</a>  
 <li><a href="errata31.html#kernresource">November 6, 2002:  
         Incorrect argument checking in the getitimer(2) system call  
         may allow an attacker to crash the system.</a>  
 <li><a href="errata31.html#smrsh">November 6, 2002:  
         An attacker can bypass smrsh(8)'s restrictions and execute  
         arbitrary commands with the privileges of his own account.</a>  
 <li><a href="errata31.html#kadmin">October 21, 2002:  
         A buffer overflow can occur in the kadmind(8) daemon, leading  
         to possible remote crash or exploit.</a>  
 <li><a href="errata31.html#kerntime">October 2, 2002:  
         Incorrect argument checking in the setitimer(2) system call  
         may allow an attacker to write to kernel memory.</a>  
 <li><a href="errata31.html#scarg">August 11, 2002:  
         An insufficient boundary check in the select system call  
         allows an attacker to overwrite kernel memory and execute arbitrary code  
         in kernel context.</a>  
 <li><a href="errata31.html#ssl">July 30, 2002:  
         Several remote buffer overflows can occur in the SSL2 server and SSL3  
         client of the ssl(8) library, as in the ASN.1 parser code in the  
         crypto(3) library, all of them being potentially remotely  
         exploitable.</a>  
 <li><a href="errata31.html#xdr">July 29, 2002:  
         A buffer overflow can occur in the xdr_array(3) RPC code, leading to  
         possible remote crash.</a>  
 <li><a href="errata31.html#pppd">July 29, 2002:  
         A race condition exists in the pppd(8) daemon which may cause it to  
         alter the file permissions of an arbitrary file.</a>  
 <li><a href="errata31.html#isakmpd">July 5, 2002:  
         Receiving IKE payloads out of sequence can cause isakmpd(8) to  
         crash.</a>  
 <li><a href="errata31.html#ktrace">June 27, 2002:  
         The kernel would let any user ktrace set[ug]id processes.</a>  
 <li><a href="errata31.html#modssl">June 26, 2002:  
         A buffer overflow can occur in the .htaccess parsing code in  
         mod_ssl httpd module, leading to possible remote crash or exploit.</a>  
 <li><a href="errata31.html#resolver">June 25, 2002:  
         A potential buffer overflow in the DNS resolver has been found.</a>  
 <li><a href="errata31.html#sshd">June 24, 2002:  
         All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an  
         input validation error that can result in an integer overflow and  
         privilege escalation.</a>  
 <li><a href="errata31.html#httpd">June 19, 2002:  
         A buffer overflow can occur during the interpretation of chunked  
         encoding in httpd(8), leading to possible remote crash.</a>  
 <li><a href="errata31.html#sshbsdauth">May 22, 2002:  
         Under certain conditions, on systems using YP with netgroups  
         in the password database, it is possible that sshd(8) does  
         ACL checks for the requested user name but uses the password  
         database entry of a different user for authentication.  This  
         means that denied users might authenticate successfully  
         while permitted users could be locked out.</a>  
 <li><a href="errata31.html#fdalloc2">May 8, 2002:  
         A race condition exists that could defeat the kernel's  
         protection of fd slots 0-2 for setuid processes.</a>  
 <li><a href="errata31.html#sudo">April 25, 2002:  
         A bug in sudo may allow an attacker to corrupt the heap.</a>  
 <li><a href="errata31.html#sshafs">April 22, 2002:  
         A local user can gain super-user privileges due to a buffer  
         overflow in sshd(8) if AFS has been configured on the system  
         or if KerberosTgtPassing or AFSTokenPassing has been enabled  
         in the sshd_config file.</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="30"></a>  
   
 <h3><font color="#e00000">OpenBSD 3.0 Security Advisories</font></h3>  
 These are the OpenBSD 3.0 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a> for 3.0 is no longer being maintained,  
 you should update your machine.  
   
 <p>  
 <ul>  
 <li><a href="errata30.html#named">November 14, 2002:  
         A buffer overflow exists in named(8) that could lead to a  
         remote crash or code execution as user named in a chroot jail.</a>  
 <li><a href="errata30.html#kernresource">November 6, 2002:  
         Incorrect argument checking in the getitimer(2) system call  
         may allow an attacker to crash the system.</a>  
 <li><a href="errata30.html#smrsh">November 6, 2002:  
         An attacker can bypass smrsh(8)'s restrictions and execute  
         arbitrary commands with the privileges of his own account.</a>  
 <li><a href="errata30.html#kadmin">October 21, 2002:  
         A buffer overflow can occur in the kadmind(8) daemon, leading  
         to possible remote crash or exploit.</a>  
 <li><a href="errata30.html#kerntime">October 7, 2002:  
         Incorrect argument checking in the setitimer(2) system call  
         may allow an attacker to write to kernel memory.</a>  
 <li><a href="errata30.html#scarg">August 11, 2002:  
         An insufficient boundary check in the select and poll system calls  
         allows an attacker to overwrite kernel memory and execute arbitrary code  
         in kernel context.</a>  
 <li><a href="errata30.html#ssl">July 30, 2002:  
         Several remote buffer overflows can occur in the SSL2 server and SSL3  
         client of the ssl(8) library, as in the ASN.1 parser code in the  
         crypto(3) library, all of them being potentially remotely  
         exploitable.</a>  
 <li><a href="errata30.html#xdr">July 29, 2002:  
         A buffer overflow can occur in the xdr_array(3) RPC code, leading to  
         possible remote crash.</a>  
 <li><a href="errata30.html#pppd">July 29, 2002:  
         A race condition exists in the pppd(8) daemon which may cause it to  
         alter the file permissions of an arbitrary file.</a>  
 <li><a href="errata30.html#isakmpd2">July 5, 2002:  
         Receiving IKE payloads out of sequence can cause isakmpd(8) to  
         crash.</a>  
 <li><a href="errata30.html#ktrace">June 27, 2002:  
         The kernel would let any user ktrace set[ug]id processes.</a>  
 <li><a href="errata30.html#resolver">June 25, 2002:  
         A potential buffer overflow in the DNS resolver has been found.</a>  
 <li><a href="errata30.html#sshdauth">June 24, 2002:  
         All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an  
         input validation error that can result in an integer overflow and  
         privilege escalation.</a>  
 <li><a href="errata30.html#modssl">June 24, 2002:  
         A buffer overflow can occur in the .htaccess parsing code in  
         mod_ssl httpd module, leading to possible remote crash or exploit.</a>  
 <li><a href="errata30.html#httpd">June 19, 2002:  
         A buffer overflow can occur during the interpretation of chunked  
         encoding in httpd(8), leading to possible remote crash.</a>  
 <li><a href="errata30.html#fdalloc2">May 8, 2002:  
         A race condition exists that could defeat the kernel's  
         protection of fd slots 0-2 for setuid processes.</a>  
 <li><a href="errata30.html#sudo2">April 25, 2002:  
         A bug in sudo may allow an attacker to corrupt the heap.</a>  
 <li><a href="errata30.html#sshafs">April 22, 2002:  
         A local user can gain super-user privileges due to a buffer  
         overflow in sshd(8) if AFS has been configured on the system  
         or if KerberosTgtPassing or AFSTokenPassing has been enabled  
         in the sshd_config file.</a>  
 <li><a href="errata30.html#mail">April 11, 2002:  
         The mail(1) was interpreting tilde escapes even when invoked  
         in non-interactive mode.  As mail(1) is called as root from cron,  
         this can lead to a local root compromise.</a>  
 <li><a href="errata30.html#approval">March 19, 2002:  
         Under certain conditions, on systems using YP with netgroups in  
         the password database, it is possible for the rexecd(8) and rshd(8)  
         daemons to execute a shell from a password database entry for a  
         different user. Similarly, atrun(8) may change to the wrong  
         home directory when running jobs.</a>  
 <li><a href="errata30.html#zlib">March 13, 2002:  
         A potential double free() exists in the zlib library;  
         this is not exploitable on OpenBSD.  
         The kernel also contains a copy of zlib; it is not  
         currently known if the kernel zlib is exploitable.</a>  
 <li><a href="errata30.html#openssh">March 8, 2002:  
         An off-by-one check in OpenSSH's channel forwarding code  
         may allow a local user to gain super-user privileges.</a>  
 <li><a href="errata30.html#ptrace">January 21, 2002:  
         A race condition between the ptrace(2) and execve(2) system calls  
         allows an attacker to modify the memory contents of suid/sgid  
         processes which could lead to compromise of the super-user account.</a>  
 <li><a href="errata30.html#sudo">January 17, 2002:  
         There is a security hole in sudo(8) that can be exploited  
         when the Postfix sendmail replacement is installed that may  
         allow an attacker on the local host to gain root privileges.</a>  
 <li><a href="errata30.html#lpd">November 28, 2001:  
         An attacker can trick a machine running the lpd daemon into  
         creating new files in the root directory from a machine with  
         remote line printer access.</a>  
 <li><a href="errata30.html#vi.recover">November 13, 2001:  
         The vi.recover script can be abused in such a way as  
         to cause arbitrary zero-length files to be removed.</a>  
 <li><a href="errata30.html#pf">November 13, 2001:  
         pf(4) was incapable of dealing with certain ipv6 icmp packets,  
         resulting in a crash.</a>  
 <li><a href="errata30.html#sshd">November 12, 2001:  
         A security hole that may allow an attacker to partially authenticate  
         if -- and only if -- the administrator has enabled KerberosV.</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="29"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.9 Security Advisories</font></h3>  
 These are the OpenBSD 2.9 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a>. for 2.9 is no longer being maintained,  
 you should update your machine.  
   
   
 <p>  
 <ul>  
 <li><a href="errata29.html#resolver">June 25, 2002:  
         A potential buffer overflow in the DNS resolver has been found.</a>  
 <li><a href="errata29.html#fdalloc2">May 8, 2002:  
         A race condition exists that could defeat the kernel's  
         protection of fd slots 0-2 for setuid processes.</a>  
 <li><a href="errata29.html#sudo2">April 25, 2002:  
         A bug in sudo may allow an attacker to corrupt the heap.</a>  
 <li><a href="errata29.html#sshafs">April 22, 2002:  
         A local user can gain super-user privileges due to a buffer  
         overflow in sshd(8) if AFS has been configured on the system  
         or if KerberosTgtPassing or AFSTokenPassing has been enabled  
         in the sshd_config file.</a>  
 <li><a href="errata29.html#mail">April 11, 2002:  
         The mail(1) was interpreting tilde escapes even when invoked  
         in non-interactive mode.  As mail(1) is called as root from cron,  
         this can lead to a local root compromise.</a>  
 <li><a href="errata29.html#zlib">March 13, 2002:  
         A potential double free() exists in the zlib library;  
         this is not exploitable on OpenBSD.  
         The kernel also contains a copy of zlib; it is not  
         currently known if the kernel zlib is exploitable.</a>  
 <li><a href="errata29.html#openssh">March 8, 2002:  
         An off-by-one check in OpenSSH's channel forwarding code  
         may allow a local user to gain super-user privileges.</a>  
 <li><a href="errata29.html#ptrace">January 21, 2002:  
         A race condition between the ptrace(2) and execve(2) system calls  
         allows an attacker to modify the memory contents of suid/sgid  
         processes which could lead to compromise of the super-user account.</a>  
 <li><a href="errata29.html#sudo">January 17, 2002:  
         There is a security hole in sudo(8) that can be exploited  
         when the Postfix sendmail replacement is installed that may  
         allow an attacker on the local host to gain root privileges.</a>  
 <li><a href="errata29.html#lpd2">November 28, 2001:  
         An attacker can trick a machine running the lpd daemon into  
         creating new files in the root directory from a machine with  
         remote line printer access.</a>  
 <li><a href="errata29.html#vi.recover">November 13, 2001:  
         The vi.recover script can be abused in such a way as  
         to cause arbitrary zero-length files to be removed.</a>  
 <li><a href="errata29.html#uucp">September 11, 2001:  
         A security hole exists in uuxqt(8) that may allow an  
         attacker to gain root privileges.</a>  
 <li><a href="errata29.html#lpd">August 29, 2001:  
         A security hole exists in lpd(8) that may allow an  
         attacker to gain root privileges if lpd is running.</a>  
 <li><a href="errata29.html#sendmail2">August 21, 2001:  
         A security hole exists in sendmail(8) that may allow an  
         attacker on the local host to gain root privileges.</a>  
 <li><a href="errata29.html#nfs">July 30, 2001:  
         A kernel buffer overflow in the NFS code can be used to execute  
         arbitrary code by users with mount privileges (only root by  
         default).</a>  
 <li><a href="errata29.html#kernexec">June 15, 2001:  
         A race condition in the kernel can lead to local root compromise.</a>  
 <li><a href="errata29.html#sshcookie">June 12, 2001:  
         sshd(8) allows users to delete arbitrary files named "cookies"  
         if X11 forwarding is enabled. X11 forwarding is disabled  
         by default.</a>  
 <li><a href="errata29.html#fts">May 30, 2001:  
         Programs using the fts routines can be tricked into changing  
         into the wrong directory.</a>  
 <li><a href="errata29.html#sendmail">May 29, 2001:  
         Sendmail signal handlers contain unsafe code,  
         leading to numerous race conditions.</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="28"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.8 Security Advisories</font></h3>  
 These are the OpenBSD 2.8 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>. The  
 <a href="stable.html">patch branch</a>. for 2.8 is no longer being maintained,  
 you should update your machine.  
   
   
 <p>  
 <ul>  
 <li><a href="errata28.html#uucp">September 11, 2001:  
         A security hole exists in uuxqt(8) that may allow an  
         attacker to gain root privileges.</a>  
 <li><a href="errata28.html#lpd">August 29, 2001:  
         A security hole exists in lpd(8) that may allow an  
         attacker to gain root privileges if lpd is running.</a>  
 <li><a href="errata28.html#sendmail2">August 21, 2001:  
         A security hole exists in sendmail(8) that may allow an  
         attacker on the local host to gain root privileges.</a>  
 <li><a href="errata28.html#kernexec">June 15, 2001:  
         A race condition in the kernel can lead to local root compromise.</a>  
 <li><a href="errata28.html#fts">May 30, 2001:  
         Programs using the fts routines can be tricked into changing  
         into the wrong directory.</a>  
 <li><a href="errata28.html#sendmail">May 29, 2001:  
         Sendmail signal handlers contain unsafe code,  
         leading to numerous race conditions.</a>  
 <li><a href="errata28.html#ipf_frag">Apr 23, 2001:  
         IPF contains a serious bug with its handling of fragment caching.</a>  
 <li><a href="errata28.html#glob_limit">Apr 23, 2001:  
         ftpd(8) contains a potential DoS relating to glob(3).</a>  
 <li><a href="errata28.html#glob">Apr 10, 2001:  
         The glob(3) library call contains multiple buffer overflows.</a>  
 <li><a href="errata28.html#readline">Mar 18, 2001:  
         The readline library creates history files with permissive modes based on the user's umask.</a>  
 <li><a href="errata28.html#ipsec_ah">Mar 2, 2001:  
         Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun in the kernel.</a>  
 <li><a href="errata28.html#userldt">Mar 2, 2001:  
         The <b>USER_LDT</b> kernel option allows an attacker to gain access to privileged areas of kernel memory.</a>  
 <li><a href="errata28.html#sudo">Feb 22, 2001:  
         a non-exploitable buffer overflow was fixed in sudo(8).</a>  
 <li><a href="errata28.html#named">Jan 29, 2001:  
         merge named(8) with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities.</a>  
 <li><a href="errata28.html#rnd">Jan 22, 2001:  
         rnd(4) did not use all of its input when written to.</a>  
 <li><a href="errata28.html#xlock">Dec 22, 2000:  
         xlock(1)'s authentication was re-done to authenticate via a named pipe. (patch and new xlock binaries included).</a>  
 <li><a href="errata28.html#procfs">Dec 18, 2000:  
         Procfs contains numerous overflows. Procfs is not used by default in OpenBSD. (patch included).</a>  
 <li><a href="errata28.html#kerberos2">Dec 10, 2000:  
         Another problem exists in KerberosIV libraries (patch included).</a>  
 <li><a href="errata28.html#kerberos">Dec 7, 2000:  
         A set of problems in KerberosIV exist (patch included).</a>  
 <li><a href="errata28.html#ftpd">Dec 4, 2000:  
         A single-byte buffer overflow exists in ftpd (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="27"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.7 Security Advisories</font></h3>  
 These are the OpenBSD 2.7 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>.  Obviously, all the  
 OpenBSD 2.6 advisories listed below are fixed in OpenBSD 2.7.  
   
 <p>  
 <ul>  
 <li><a href="errata27.html#readline">Mar 18, 2001:  
         The readline library creates history files with permissive modes based on the user's umask.</a>  
 <li><a href="errata27.html#sudo">Feb 22, 2001:  
         a buffer overflow was fixed in sudo(8).</a>  
 <li><a href="errata27.html#ftpd">Dec 4, 2000:  
         A single-byte buffer overflow exists in ftpd (patch included).</a>  
 <li><a href="errata27.html#sshforwarding">Nov 10, 2000:  
         Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  
         (patch included)</a>  
 <li><a href="errata27.html#xtrans">Oct 26, 2000:  
         X11 libraries have 2 potential overflows in xtrans code.  
         (patch included)</a>  
 <li><a href="errata27.html#httpd">Oct 18, 2000:  
         Apache mod_rewrite and mod_vhost_alias modules could expose files  
         on the server in certain configurations if used.  
         (patch included)</a>  
 <li><a href="errata27.html#telnetd">Oct 10, 2000:  
         The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS,  
         TERMPATH and TERMCAP environment variables as it should.  
         (patch included)</a>  
 <li><a href="errata27.html#format_strings">Oct 6, 2000:  
         There are printf-style format string bugs in several privileged  
         programs.  (patch included)</a>  
 <li><a href="errata27.html#curses">Oct 6, 2000:  
         libcurses honored terminal descriptions in the $HOME/.terminfo  
         directory as well as in the TERMCAP environment variable for  
         setuid and setgid applications.  
         (patch included)</a>  
 <li><a href="errata27.html#talkd">Oct 6, 2000:  
         A format string vulnerability exists in talkd(8).  
         (patch included)</a>  
 <li><a href="errata27.html#pw_error">Oct 3, 2000:  
         A format string vulnerability exists in the pw_error() function of the  
         libutil library, yielding localhost root through chpass(1).  
         (patch included)</a>  
 <li><a href="errata27.html#ipsec">Sep 18, 2000:  
         Bad ESP/AH packets could cause a crash under certain conditions.  
         (patch included)</a>  
 <li><a href="errata27.html#xlock">Aug 16, 2000:  
         A format string vulnerability (localhost root) exists in xlock(1).  
         (patch included)</a>  
 <li><a href="errata27.html#X11_libs">July 14, 2000:  
         Various bugs found in X11 libraries have various side effects, almost  
         completely denial of service in OpenBSD.  
         (patch included)</a>  
 <li><a href="errata27.html#ftpd">July 5, 2000:  
         Just like pretty much all the other unix ftp daemons  
         on the planet, ftpd had a remote root hole in it.  
         Luckily, ftpd was not enabled by default.  
         The problem exists if anonymous ftp is enabled.  
         (patch included)</a>  
 <li><a href="errata27.html#mopd">July 5, 2000:  
         Mopd, very rarely used, contained some buffer overflows.  
         (patch included)</a>  
 <li><a href="errata27.html#libedit">June 28, 2000:  
         libedit would check for a <b>.editrc</b> file in the current  
         directory.  Not known to be a real security issue, but a patch  
         is available anyways.  
         (patch included)</a>  
 <li><a href="errata27.html#dhclient">June 24, 2000:  
         A serious bug in dhclient(8) could allow strings from a  
         malicious dhcp server to be executed in the shell as root.  
         (patch included)</a>  
 <li><a href="errata27.html#isakmpd">June 9, 2000:  
         A serious bug in isakmpd(8) policy handling wherein  
         policy verification could be completely bypassed in isakmpd.  
         (patch included)</a>  
 <li><a href="errata27.html#uselogin">June 6, 2000:  
         The non-default flag UseLogin in <b>/etc/sshd_config</b> is broken,  
         should not be used, and results in security problems on  
         other operating systems.</a>  
 <li><a href="errata27.html#bridge">May 26, 2000:  
         The bridge(4) <i>learning</i> flag may be bypassed.  
         (patch included)</a>  
 <li><a href="errata27.html#ipf">May 25, 2000:  
         Improper use of ipf <i>keep-state</i> rules can result  
         in firewall rules being bypassed. (patch included)</a>  
   
 </ul>  
   
 <p>  
 <li>  
 <a name="26"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.6 Security Advisories</font></h3>  
 These are the OpenBSD 2.6 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>.  Obviously, all the  
 OpenBSD 2.5 advisories listed below are fixed in OpenBSD 2.6.  
   
 <p>  
 <ul>  
 <li><a href="errata26.html#semconfig">May 26, 2000:  
         SYSV semaphore support contained an undocumented system call  
         which could wedge semaphore-using processes from exiting. (patch included)</a>  
 <li><a href="errata26.html#ipf">May 25, 2000:  
         Improper use of ipf <i>keep-state</i> rules can result  
         in firewall rules being bypassed. (patch included)</a>  
 <li><a href="errata26.html#xlockmore">May 25, 2000:  
         xlockmore has a bug which a localhost attacker can use to gain  
         access to the encrypted root password hash (which is normally  
         encoded using blowfish</a> (see  
         <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&amp;sektion=3">  
         crypt(3)</a>)  
         (patch included).  
 <li><a href="errata26.html#procfs">Jan 20, 2000:  
         Systems running with procfs enabled and mounted are  
         vulnerable to a very tricky exploit.  procfs is not  
         mounted by default.  
         (patch included).</a>  
 <li><a href="errata26.html#sendmail">Dec 4, 1999:  
         Sendmail permitted any user to cause an aliases file wrap,  
         thus exposing the system to a race where the aliases file  
         did not exist.  
         (patch included).</a>  
 <li><a href="errata26.html#poll">Dec 4, 1999:  
         Various bugs in poll(2) may cause a kernel crash.</a>  
 <li><a href="errata26.html#sslUSA">Dec 2, 1999:  
         A buffer overflow in the RSAREF code included in the  
         USA version of libssl, is possibly exploitable in  
         httpd, ssh, or isakmpd, if SSL/RSA features are enabled.  
         (patch included).<br></a>  
         <strong>Update:</strong> Turns out that this was not exploitable  
         in any of the software included in OpenBSD 2.6.  
 <li><a href="errata26.html#ifmedia">Nov 9, 1999:  
         Any user could change interface media configurations, resulting in  
         a localhost denial of service attack.  
         (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="25"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.5 Security Advisories</font></h3>  
 These are the OpenBSD 2.5 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>.  Obviously, all the  
 OpenBSD 2.4 advisories listed below are fixed in OpenBSD 2.5.  
   
 <p>  
 <ul>  
 <li><a href="errata25.html#cron">Aug 30, 1999:  
         In cron(8), make sure argv[] is NULL terminated in the  
         fake popen() and run sendmail as the user, not as root.  
         (patch included).</a>  
 <li><a href="errata25.html#miscfs">Aug 12, 1999: The procfs and fdescfs  
         filesystems had an overrun in their handling of uio_offset  
         in their readdir() routines. (These filesystems are not  
         enabled by default). (patch included).</a>  
 <li><a href="errata25.html#profil">Aug 9, 1999: Stop profiling (see profil(2))  
         when we execve() a new process. (patch included).</a>  
 <li><a href="errata25.html#ipsec_in_use">Aug 6, 1999: Packets that should have  
         been handled by IPsec may be transmitted as cleartext.  
         PF_KEY SA expirations may leak kernel resources.  
         (patch included).</a>  
 <li><a href="errata25.html#rc">Aug 5, 1999: In /etc/rc, use mktemp(1) for  
         motd re-writing and change the find(1) to use -execdir  
         (patch included).</a>  
 <li><a href="errata25.html#chflags">Jul 30, 1999: Do not permit regular  
         users to chflags(2) or fchflags(2) on character or block devices  
         which they may currently be the owner of (patch included).</a>  
 <li><a href="errata25.html#nroff">Jul 27, 1999: Cause groff(1) to be invoked  
         with the -S flag, when called by nroff(1) (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="24"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.4 Security Advisories</font></h3>  
 These are the OpenBSD 2.4 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>.  Obviously, all the  
 OpenBSD 2.3 advisories listed below are fixed in OpenBSD 2.4.  
   
 <p>  
 <ul>  
 <li><a href="errata24.html#poll">Mar 22, 1999: The nfds argument for poll(2) needs  
         to be constrained, to avoid kvm starvation (patch included).</a>  
 <li><a href="errata24.html#tss">Mar 21, 1999: A change in TSS handling stops  
         another kernel crash case caused by the <strong>crashme</strong>  
         program (patch included).</a>  
 <li><a href="errata24.html#nlink">Feb 25, 1999: An unbounded increment on the  
         nlink value in FFS and EXT2FS filesystems can cause a system crash.  
         (patch included).</a>  
 <li><a href="errata24.html#ping">Feb 23, 1999: Yet another buffer overflow  
         existed in ping(8). (patch included).</a>  
 <li><a href="errata24.html#ipqrace">Feb 19, 1999: ipintr() had a race in use of  
         the ipq, which could permit an attacker to cause a crash.  
         (patch included).</a>  
 <li><a href="errata24.html#accept">Feb 17, 1999: A race condition in the  
         kernel between accept(2) and select(2) could permit an attacker  
         to hang sockets from remote.  
         (patch included).</a>  
 <li><a href="errata24.html#maxqueue">Feb 17, 1999: IP fragment assembly can  
         bog the machine excessively and cause problems.  
         (patch included).</a>  
 <li><a href="errata24.html#trctrap">Feb 12, 1999: i386 T_TRCTRAP handling and  
         DDB interacted to possibly cause a crash.  
         (patch included).</a>  
 <li><a href="errata24.html#rst">Feb 11, 1999: TCP/IP RST handling was sloppy.  
         (patch included).</a>  
 <li><a href="errata24.html#bootpd">Nov 27, 1998: There is a remotely exploitable  
         problem in bootpd(8). (patch included).</a>  
 <li><a href="errata24.html#termcap">Nov 19, 1998: There is a possibly locally  
         exploitable problem relating to environment variables in termcap  
         and curses. (patch included).</a>  
 <li><a href="errata24.html#tcpfix">Nov 13, 1998: There is a remote machine lockup  
         bug in the TCP decoding kernel. (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="23"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.3 Security Advisories</font></h3>  
 These are the OpenBSD 2.3 advisories -- all these problems are solved  
 in <a href="anoncvs.html">OpenBSD current</a>.  Obviously, all the  
 OpenBSD 2.2 advisories listed below are fixed in OpenBSD 2.3.  
   
 <p>  
 <ul>  
 <li><a href="errata23.html#bootpd">Nov 27, 1998: There is a remotely exploitable  
         problem in bootpd(8). (patch included).</a>  
 <li><a href="errata23.html#tcpfix">Nov 13, 1998: There is a remote machine lockup  
         bug in the TCP decoding kernel. (patch included).</a>  
 <li><a href="errata23.html#resolver">August 31, 1998: A benign looking resolver  
         buffer overflow bug was re-introduced accidentally (patches included).</a>  
 <li><a href="errata23.html#chpass">Aug 2, 1998:  
         chpass(1) has a file descriptor leak which allows an  
         attacker to modify /etc/master.passwd.</a>  
 <li><a href="errata23.html#inetd">July 15, 1998: Inetd had a file descriptor leak.</a>  
 <li><a href="errata23.html#fdalloc">Jul  2, 1998: setuid and setgid processes  
         should not be executed with fd slots 0, 1, or 2 free.  
         (patch included).</a>  
 <li><a href="errata23.html#xlib">June 6, 1998: Further problems with the X  
         libraries (patches included).</a>  
 <li><a href="errata23.html#kill">May 17, 1998: kill(2) of setuid/setgid target  
         processes too permissive (4th revision patch included).</a>  
 <li><a href="errata23.html#immutable">May 11, 1998: mmap() permits partial bypassing  
         of immutable and append-only file flags. (patch included).</a>  
 <li><a href="errata23.html#ipsec">May  5, 1998: Incorrect handling of IPSEC packets  
         if IPSEC is enabled (patch included).</a>  
 <li><a href="errata23.html#xterm-xaw">May  1, 1998: Buffer overflow in xterm and Xaw  
         (CERT advisory VB-98.04) (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="22"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.2 Security Advisories</font></h3>  
 These are the OpenBSD 2.2 advisories.  All these problems are solved  
 in <a href="23.html">OpenBSD 2.3</a>.  Some of these problems  
 still exist in other operating systems.  (The supplied patches are for  
 OpenBSD 2.2; they may or may not work on OpenBSD 2.1).  
   
 <p>  
 <ul>  
 <li><a href="errata22.html#ipsec">May  5, 1998: Incorrect handling of IPSEC  
         packets if IPSEC is enabled (patch included).</a>  
 <li><a href="errata22.html#xterm-xaw">May  1, 1998: Buffer overflow in xterm  
         and Xaw (CERT advisory VB-98.04) (patch included).</a>  
 <li><a href="errata22.html#uucpd">Apr 22, 1998: Buffer overflow in uucpd  
         (patch included).</a>  
 <li><a href="errata22.html#rmjob">Apr 22, 1998: Buffer mismanagement in lprm  
         (patch included).</a>  
 <li><a href="errata22.html#ping">Mar 31, 1998: Overflow in ping -R (patch included).</a>  
 <li><a href="errata22.html#named">Mar 30, 1998: Overflow in named fake-iquery  
         (patch included).</a>  
 <li><a href="errata22.html#mountd">Mar  2, 1998: Accidental NFS filesystem  
         export (patch included).</a>  
 <li><a href="advisories/mmap.txt">Feb 26, 1998: Read-write mmap() flaw.</a>  
         Revision 3 of the patch is available <a href="errata22.html#mmap">here</a>  
 <li><a href="advisories/sourceroute.txt">Feb 19, 1998: Sourcerouted Packet  
         Acceptance.</a>  
         A patch is available <a href="errata22.html#sourceroute">here</a>.  
 <li><a href="errata22.html#ruserok">Feb 13, 1998: Setuid coredump &amp; Ruserok()  
         flaw (patch included).</a>  
 <li><a href="errata22.html#ldso">Feb  9, 1998: MIPS ld.so flaw (patch included).</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="21"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.1 Security Advisories</font></h3>  
 These are the OpenBSD 2.1 advisories.  All these problems are solved  
 in <a href="22.html">OpenBSD 2.2</a>.  Some of these problems still  
 exist in other operating systems.  (If you are running OpenBSD 2.1, we  
 would strongly recommend an upgrade to the newest release, as this  
 patch list only attempts at fixing the most important security  
 problems.  In particular, OpenBSD 2.2 fixes numerous localhost  
 security problems.  Many of those problems were solved in ways which  
 make it hard for us to provide patches).  
   
 <p>  
 <ul>  
 <li><a href="advisories/signals.txt">Sep 15, 1997: Deviant Signals (patch included)</a>  
 <li><a href="advisories/rfork.txt">Aug  2, 1997: Rfork() system call flaw  
         (patch included)</a>  
 <li><a href="advisories/procfs.txt">Jun 24, 1997: Procfs flaws (patch included)</a>  
 </ul>  
   
 <p>  
 <li>  
 <a name="20"></a>  
   
 <h3><font color="#e00000">OpenBSD 2.0 Security Advisories</font></h3>  
 These are the OpenBSD 2.0 advisories.  All these problems are solved  
 in <a href="21.html">OpenBSD 2.1</a>.  Some of these problems still  
 exist in other operating systems.  (If you are running OpenBSD 2.0, we  
 commend you for being there back in the old days!, but you're really  
 missing out if you don't install a new version!)  
   
 <p>  
 <ul>  
 <li><a href="advisories/res_random.txt">April 22, 1997: Predictable IDs in the  
         resolver (patch included)</a>  
 <li>Many others... if people can hunt them down, please let me know  
         and we'll put them up here.  
 </ul>  
 <p>  
   
 <a name="watching"></a>  <a name="watching"></a>
 <li><h3><font color="#e00000">Watching our Changes</font></h3><p>  <li><h3><font color="#e00000">Watching our Changes</font></h3><p>

Legend:
Removed from v.1.417  
changed lines
  Added in v.1.418