Contributed by marco on from the security-fixing dept.
Two security fixes are there: OpenBSD 3.8 errata
002: SECURITY FIX: January 5, 2006 All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
A source code patch exists which remedies this problem.
001: SECURITY FIX: January 5, 2006 All architectures
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
A source code patch exists which remedies this problem.
Perl's one is CVE-2005-3962.
(Comments are closed)
By Rembrandt (84.188.235.87) on
At least 1-2 are critical.
Everybody who downloads the Src from any FTP and does a simple CVS-Update (-rOPENBSD_3_8) will notice a lot more patches.
The worst thing I mention was a patch for something critical wich is still NOT listed (related to ssl).
So you better do not trust this Website.
Kind regards,
Rembrandt
Comments
By djm@ (203.217.30.86) on
Comments
By Justin (216.17.75.77) on
What is the patch branch?
Starting with 2.7, OpenBSD provides a source tree that contains important patches and fixes (i.e. those from the errata plus others which are obvious and simple, but do not deserve an errata entry) and makes it available via CVS in addition to the current source.
By Rembrandt (82.94.251.206) on
But if such things are just "normal" Patches for the stable branch:
Yes I never get it.. seams so.
Maybe I'm blind or just stupid.. don't know.
But maybe it simply just sucks to see security related patches wich are not listed. And I don't mean patches to fix any crashs of any xyz-NICs.
Comments
By djm@ (203.217.30.86) on
By Anonymous Coward (67.64.89.177) on
Something like this seems a good candidate.
Comments
By Anonymous Coward (69.70.207.240) on
Comments
By Anonymous Coward (142.166.105.158) on
By Rembrandt (82.174.96.141) on
3.8_BASE -> 3.8 (Stable):
P src/gnu/usr.bin/perl/globvar.sym
P src/gnu/usr.bin/perl/makedef.pl
P src/gnu/usr.bin/perl/op.c
P src/gnu/usr.bin/perl/opcode.h
P src/gnu/usr.bin/perl/opcode.pl
P src/gnu/usr.bin/perl/patchlevel.h
P src/gnu/usr.bin/perl/perl.h
P src/gnu/usr.bin/perl/sv.c
P src/lib/libssl/src/ssl/s23_srvr.c
P src/sys/conf/newvers.sh
P src/sys/dev/ic/ami.c
P src/sys/dev/ic/ciss.c
P src/sys/dev/pci/ami_pci.c
P src/sys/dev/raidframe/rf_openbsdkintf.c
P src/sys/isofs/cd9660/cd9660_vfsops.c
P src/sys/kern/kern_clock.c
P src/sys/kern/kern_descrip.c
P src/sys/kern/kern_exec.c
P src/sys/kern/kern_time.c
P src/sys/kern/vfs_bio.c
P src/sys/kern/vfs_subr.c
P src/sys/netinet/ip_carp.c
P src/sys/sys/proc.h
P src/usr.sbin/authpf/authpf.c
P src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
Just check your beloved errata-Website.
I would miss:
src/lib/libssl/src/ssl/s23_srvr.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s23_srvr.c
CAN-2005-2969
src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
fixes CAN-2005-2700
Just two things wich proof that all you belive in is crap...
The errata-Website is a piece of junk, useless for all those who relying on it to patch their System because they'll miss at least 2 Patches wich are not that unimportent.
Rembrandt
Comments
By Anonymous Coward (84.193.129.186) on
try your best...
>3.8_BASE -> 3.8 (Stable):
[snip]
>P src/lib/libssl/src/ssl/s23_srvr.c
>P src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
>
>Just check your beloved errata-Website.
>I would miss:
>
>src/lib/libssl/src/ssl/s23_srvr.c
>http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s23_srvr.c
>CAN-2005-2969
>
>src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
>http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
>fixes CAN-2005-2700
[snip]
You were saying?
Comments
By Echo Shell (192.75.238.222) on
*Holding stomach and crying on floor*
I LOVE it when I read these things!!!!
-Echo Shell
Adjunct Apprentice
By m (62.141.24.81) on
Comments
By Anonymous Coward (142.166.105.158) on
Comments
By m (62.141.24.65) on
Comments
By Anonymous Coward (213.84.84.111) on
Comments
By m (62.141.24.65) on
Comments
By Anonymous Coward (213.84.84.111) on
By djm@ (203.58.120.11) on
By djm@ (203.58.120.11) on
If you don't like the level of detail included in the patch descriptions, that is too bad, but to extrapolate from that to an accusation that we try to cover over bugs is unfair and obviously wrong.
Comments
By Rembrandt (195.169.149.213) on
I've to angree with that because it's my attitude.
But even you must have to angree that there 2 more importent Patches and that those Patches are NOT listed.
It happened more then one time and it simply still sucks that such things still happen.
Don't missunderstand me.
I like OpenBSD, I love it...
The more it makes me sad that errata-Website is wrong again and again (every 2 Releases you can beat there's at least 1 Bug wich is NOT listed there even security-related).
I mean YOU (the developers) fixed it. So why isn't it listed?
And I don't mean the usual things wich will get patched too.
So if you don't wanna list src/sys/dev/ic/ciss.c you don#t have to because it's not security-related.
*my oppinion*
But if you claim to develop one of the most secure OSs wich are avaiable you should at least list all security related Patches and just the latest Patches.
*/my oppinion*
And this happens again and again...
"Our Websites/Bug-Tracking-Reports/xyz is free for everybody"
Yes it is. But does everybody has the time to check every CVS-Comment?
So it's even more importent that the errata-Website is correct.
Kind regards,
Rembrandt
By Rembrandt (82.174.96.141) on
The NFS-Implementation is a piece of shit and does errors all the day long.
Use NFS with TCP and shut down the NFS-Server.
I'll beat your Console on your OpenBSD-Client will hang if you try to do a simple ls in the NFS-Mount even the server is powered on again and even you specified a timeout. You simply loose your tty until you kill the process.
You need to reboot the NFS-Client. Is that the "Quality" you're talking about?
Hey well it's a perfect Firewall-System but as "secure" Workstation it isn't that good.
Also that the errata-Website misses Patches is not NEW...
OpenBSD is even that secure that your wsmoused dies if you're switching from a console to X and vice versa. Just try it.. it will die after some switches.
Just some things wich are NOT knew, wich are KNOWN (NFS is brocken since 3.6).
Compare my listing in another reply above (wich deals with the patches).
Even you'll maybe have to angree that at least the other 2 Patches should get noticed because they're not in 3_8_BASE so every Server applying just the patches at the errata will miss at least 2 Patches for sure.
Rembrandt
Comments
By Anonymous Coward (69.173.129.197) on
Comments
By Rembrandt (198.252.201.22) on
But back to the roots.
2 Patches are missing, they where patches, they where not listed at the errata-Website and it wasn't the first time.
And such things are not related to the "manpower".
Because there was enought manpower to list 2 of 4 Patches so there should be enought manpower to list them all.
Rembrandt
Comments
By Anonymous Coward (145.238.2.120) on
> 2 Patches are missing, they where patches, they where not listed at
> the errata-Website and it wasn't the first time.
I don't understand what you mean ???
There are only 2 patches in:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/
... so why sould they list 4 ?
Comments
By Rembrandt (212.227.108.114) on
src/lib/libssl/src/ssl/s23_srvr.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s23_srvr.c
CAN-2005-2969
src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/httpd/src/modules/ssl/ssl_engine_kernel.c
CAN-2005-2700
Rembrandt
Comments
By Anonymous Coward (145.238.2.120) on
Not everything that goes under -stable becomes a patch.
By tedu (71.139.175.127) on
By Anonymous Coward (81.84.108.22) on
Comments
By Rembrandt (82.94.251.206) on
But currently I'm in a bad mood because of the rrata-Website wich simply lies because it misses 2 Patches.
And this isn't the first time...
Rembrandt
Comments
By Brad (216.138.195.228) brad at comstyle dot com on
Comments
By Anonymous Coward (198.252.201.22) Rembrandt on
By Anonymous Coward (82.155.144.130) on
By Anonymous Coward (62.252.32.11) on
Comments
By Miod Vallat (82.101.10.6) miod@ on
mechanism could be abused, so its usage has been restricted for sxid binaries.
The diff is valid on older OpenBSD versions as well, since this is not a regression.
Comments
By Anonymous Coward (62.252.32.11) on
By Anonymous Coward (84.9.42.8) on
Constrain i386_set_ioperm(2) so even root is blocked from accessing the ioports unless the machine is running at lower securelevels or with an open X11 aperture.
A source code patch exists which remedies this problem.
# 003: RELIABILITY FIX: January 13, 2006 i386 architecture
Change the implementation of i386 W^X so that the "execute line" can move around. Before it was limited to being either at 512MB (below which all code normally lands) or at the top of the stack. Now the line can float as mprotect(2) and mmap(2) requests need it to. This is now implemented using only GDT selectors instead of the LDT so that it is more robust as well.
A source code patch exists which remedies this problem.
Comments
By Anonymous Coward (84.9.42.8) on