This is the OpenBSD 4.2 release errata & patch list:
For OpenBSD patch branch information, please refer here.
For important packages updates, please refer here.
For errata on a certain release, click below:
2.1,
2.2,
2.3,
2.4,
2.5,
2.6,
2.7,
2.8,
2.9,
3.0,
3.1,
3.2,
3.3,
3.4,
3.5,
3.6,
3.7,
3.8,
3.9,
4.0,
4.1.
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
The patches below are available in CVS via the
OPENBSD_4_2
patch branch.
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
008: RELIABILITY FIX: February 25, 2008 All architectures
Malformed IPv6 routing headers can cause a kernel panic.
A source code patch exists which remedies this problem.
-
007: RELIABILITY FIX: February 22, 2008 All architectures
Incorrect assumptions in tcp_respond can lead to a kernel panic.
A source code patch exists which remedies this problem.
-
006: SECURITY FIX: February 8, 2008 All architectures
2nd revision, February 10, 2008
Multiple vulnerabilities have been discovered in X.Org.
XFree86 Misc extension out of bounds array index,
File existence disclosure,
Xinput extension memory corruption,
TOG-cup extension memory corruption,
MIT-SHM and EVI extensions integer overflows,
PCF Font parser buffer overflow.
CVE-2007-5760,
CVE-2007-5958,
CVE-2007-6427,
CVE-2007-6428,
CVE-2007-6429,
CVE-2008-0006.
A source code patch exists which remedies this problem.
-
005: RELIABILITY FIX: January 11, 2008 All architectures
A missing NULL pointer check can lead to a kernel panic.
A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: November 27, 2007 All architectures
A memory leak in pf can lead to machine lockups.
A source code patch exists which remedies this problem.
-
003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007 i386 only
Some older BIOSes are unable to boot CD1.
A workaround using CD2 (amd64 architecture) is as follows.
(An amd64 machine is NOT required for this to work.)
- Insert CD2 and tell your computer to boot it;
- When the boot> prompt appears, stop the automatic boot
by pressing the space bar;
- Remove CD2 and insert CD1;
- Erase the character you typed to stop the boot, type
boot /4.2/i386/bsd.rd
then press Enter.
-
002: SECURITY FIX: October 10, 2007 All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
A source code patch exists which remedies this problem.
-
001: SECURITY FIX: October 8, 2007 All architectures
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
A source code patch exists which remedies this problem.
For OpenBSD patch branch information, please refer here.
For important packages updates, please refer here.
For errata on a certain release, click below:
2.1,
2.2,
2.3,
2.4,
2.5,
2.6,
2.7,
2.8,
2.9,
3.0,
3.1,
3.2,
3.3,
3.4,
3.5,
3.6,
3.7,
3.8,
3.9,
4.0,
4.1.
www@openbsd.org
$OpenBSD: errata42.html,v 1.13 2008/02/25 00:10:55 henning Exp $