-
Notifications
You must be signed in to change notification settings - Fork 43
/
Copy patherrata54.html
291 lines (260 loc) · 9.81 KB
/
errata54.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
<!doctype html>
<html lang=en id=errata>
<meta charset=utf-8>
<title>OpenBSD 5.4 Errata</title>
<meta name="description" content="the OpenBSD CD errata page">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" type="text/css" href="openbsd.css">
<link rel="canonical" href="https://www.openbsd.org/errata54.html">
<!--
IMPORTANT REMINDER
IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
-->
<h2 id=OpenBSD>
<a href="index.html">
<i>Open</i><b>BSD</b></a>
5.4 Errata
</h2>
<hr>
For errata on a certain release, click below:<br>
<a href="errata20.html">2.0</a>,
<a href="errata21.html">2.1</a>,
<a href="errata22.html">2.2</a>,
<a href="errata23.html">2.3</a>,
<a href="errata24.html">2.4</a>,
<a href="errata25.html">2.5</a>,
<a href="errata26.html">2.6</a>,
<a href="errata27.html">2.7</a>,
<a href="errata28.html">2.8</a>,
<a href="errata29.html">2.9</a>,
<a href="errata30.html">3.0</a>,
<a href="errata31.html">3.1</a>,
<a href="errata32.html">3.2</a>,
<a href="errata33.html">3.3</a>,
<a href="errata34.html">3.4</a>,
<a href="errata35.html">3.5</a>,
<br>
<a href="errata36.html">3.6</a>,
<a href="errata37.html">3.7</a>,
<a href="errata38.html">3.8</a>,
<a href="errata39.html">3.9</a>,
<a href="errata40.html">4.0</a>,
<a href="errata41.html">4.1</a>,
<a href="errata42.html">4.2</a>,
<a href="errata43.html">4.3</a>,
<a href="errata44.html">4.4</a>,
<a href="errata45.html">4.5</a>,
<a href="errata46.html">4.6</a>,
<a href="errata47.html">4.7</a>,
<a href="errata48.html">4.8</a>,
<a href="errata49.html">4.9</a>,
<a href="errata50.html">5.0</a>,
<a href="errata51.html">5.1</a>,
<br>
<a href="errata52.html">5.2</a>,
<a href="errata53.html">5.3</a>,
<a href="errata55.html">5.5</a>,
<a href="errata56.html">5.6</a>,
<a href="errata57.html">5.7</a>,
<a href="errata58.html">5.8</a>,
<a href="errata59.html">5.9</a>,
<a href="errata60.html">6.0</a>,
<a href="errata61.html">6.1</a>,
<a href="errata62.html">6.2</a>,
<a href="errata63.html">6.3</a>,
<a href="errata64.html">6.4</a>,
<a href="errata65.html">6.5</a>,
<a href="errata66.html">6.6</a>,
<a href="errata67.html">6.7</a>,
<a href="errata68.html">6.8</a>,
<br>
<a href="errata69.html">6.9</a>,
<a href="errata70.html">7.0</a>,
<a href="errata71.html">7.1</a>,
<a href="errata72.html">7.2</a>,
<a href="errata73.html">7.3</a>,
<a href="errata74.html">7.4</a>,
<a href="errata75.html">7.5</a>,
<a href="errata76.html">7.6</a>,
<a href="errata77.html">7.7</a>.
<hr>
<p>
Patches for the OpenBSD base system are distributed as unified diffs.
Each patch contains usage instructions.
All the following patches are also available in one
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4.tar.gz">tar.gz file</a>
for convenience.
<p>
Patches for supported releases are also incorporated into the
<a href="stable.html">-stable branch</a>.
<hr>
<ul>
<li id="p001_pflow">
<strong>001: RELIABILITY FIX: Nov 7, 2013</strong>
<i>All architectures</i><br>
A crash can happen on
<a href="https://man.openbsd.org/OpenBSD-5.4/pflow.4">pflow(4)</a>
interface destruction.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/001_pflow.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p002_sshgcm">
<strong>002: SECURITY FIX: Nov 7, 2013</strong>
<i>All architectures</i><br>
A memory corruption vulnerability exists in the post-authentication sshd process
when an AES-GCM cipher ([email protected] or [email protected]) is
selected during kex exchange.
Review the <a href="https://www.openssh.com/txt/gcmrekey.adv">gcmrekey advisory</a>
for a mitigation.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/002_sshgcm.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p003_vnode">
<strong>003: RELIABILITY FIX: Nov 11, 2013</strong>
<i>All architectures</i><br>
An unprivileged user may hang the system.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/003_vnode.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p004_nginx">
<strong>004: SECURITY FIX: Nov 21, 2013</strong>
<i>All architectures</i><br>
A problem exists in
<a href="https://man.openbsd.org/OpenBSD-5.4/nginx.8">nginx(8)</a>
which might allow an attacker to bypass security restrictions in certain
configurations by using a specially crafted request.
This issue was assigned CVE-2013-4547.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/004_nginx.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p005_sha512">
<strong>005: RELIABILITY FIX: Dec 19, 2013</strong>
<i>Strict alignment architectures</i><br>
In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of
the application. The i386, amd64, vax and m68k platforms aren't
affected.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/005_sha512.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p006_libXfont">
<strong>006: SECURITY FIX: Jan 10, 2014</strong>
<i>All architectures</i><br>
A BDF font file containing a longer than expected string could overflow
a buffer on the stack in the X server.
This issue was assigned CVE-2013-6462.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/006_libXfont.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p007_openssl">
<strong>007: SECURITY FIX: April 8, 2014</strong>
<i>All architectures</i><br>
Missing bounds checking in OpenSSL's implementation of the TLS/DTLS
heartbeat extension (RFC6520) which can result in a leak of memory contents.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/007_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p008_openssl">
<strong>008: SECURITY FIX: April 12, 2014</strong>
<i>All architectures</i><br>
A use-after-free race condition in OpenSSL's read buffer may permit an attacker
to inject data from one connection into another.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p009_openssl">
<strong>009: RELIABILITY FIX: May 1, 2014</strong>
<i>All architectures</i><br>
An attacker can trigger generation of an SSL alert which could cause
a null pointer dereference.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/009_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p010_libXfont">
<strong>010: SECURITY FIX: May 24, 2014</strong>
<i>All architectures with X server</i><br>
X Font Service Protocol & Font metadata file handling issues in libXfont
<ul>
<li>CVE-2014-0209: integer overflow of allocations in font metadata file parsing
<li>CVE-2014-0210: unvalidated length fields when parsing xfs protocol replies
<li>CVE-2014-0211: integer overflows calculating memory needs for xfs replies
</ul>
Please see <a href="http://lists.x.org/archives/xorg-announce/2014-May/002431.html">the advisory</a> for more information.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/010_libXfont.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p011_sendmail">
<strong>011: SECURITY FIX: June 5, 2014</strong>
<i>All architectures</i><br>
Sendmail was not properly closing file descriptions before executing programs.
This could enable local users to interfere with an open SMTP connection.
This issue was assigned CVE-2014-3956.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/011_sendmail.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p012_openssl">
<strong>012: SECURITY FIX: June 6, 2014</strong>
<i>All architectures</i><br>
This patch contains a number of SSL library fixes.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/012_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p013_dhcp">
<strong>013: RELIABILITY FIX: July 30, 2014</strong>
<i>All architectures</i><br>
Packets with illegal DHCP options can lead to memory exhaustion of
<a href="https://man.openbsd.org/OpenBSD-5.4/dhclient.8">dhclient(8)</a>
and
<a href="https://man.openbsd.org/OpenBSD-5.4/dhcpd.8">dhcpd(8)</a>.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/013_dhcp.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p014_openssl">
<strong>014: SECURITY FIX: August 9, 2014</strong>
<i>All architectures</i><br>
This patch contains a number of SSL library fixes.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/014_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p015_nginx">
<strong>015: SECURITY FIX: October 1, 2014</strong>
<i>All architectures</i><br>
nginx can reuse cached SSL sessions in unrelated contexts, allowing virtual
host confusion attacks in some configurations.
This issue was assigned CVE-2014-3616.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/015_nginx.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p016_openssl">
<strong>016: RELIABILITY FIX: October 20, 2014</strong>
<i>All architectures</i><br>
Two remotely triggerable memory leaks in OpenSSL can lead to a denial of
service in server applications.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/016_openssl.patch">
A source code patch exists which remedies this problem.</a>
<p>
<li id="p017_kernexec">
<strong>017: RELIABILITY FIX: October 20, 2014</strong>
<i>All architectures</i><br>
Executable headers with an unaligned address will trigger a kernel panic.
<br>
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/017_kernexec.patch">
A source code patch exists which remedies this problem.</a>
<p>
</ul>
<hr>