openbsd_errata73.html - webdump_tests - Testfiles for webdump
 (HTM) git clone git://git.codemadness.org/webdump_tests
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
       ---
       openbsd_errata73.html (8713B)
       ---
            1 <!doctype html>
            2 <html lang=en id=errata>
            3 <meta charset=utf-8>
            4 
            5 <title>OpenBSD 7.3 Errata</title>
            6 <meta name="description" content="the OpenBSD errata page">
            7 <meta name="viewport" content="width=device-width, initial-scale=1">
            8 <link rel="stylesheet" type="text/css" href="openbsd.css">
            9 <link rel="canonical" href="https://www.openbsd.org/errata73.html">
           10 
           11 <!--
           12                         IMPORTANT REMINDER
           13         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
           14 -->
           15 
           16 <h2 id=OpenBSD>
           17 <a href="index.html">
           18 <i>Open</i><b>BSD</b></a>
           19 7.3 Errata
           20 </h2>
           21 <hr>
           22 
           23 For errata on a certain release, click below:<br>
           24 <a href="errata20.html">2.0</a>,
           25 <a href="errata21.html">2.1</a>,
           26 <a href="errata22.html">2.2</a>,
           27 <a href="errata23.html">2.3</a>,
           28 <a href="errata24.html">2.4</a>,
           29 <a href="errata25.html">2.5</a>,
           30 <a href="errata26.html">2.6</a>,
           31 <a href="errata27.html">2.7</a>,
           32 <a href="errata28.html">2.8</a>,
           33 <a href="errata29.html">2.9</a>,
           34 <a href="errata30.html">3.0</a>,
           35 <a href="errata31.html">3.1</a>,
           36 <a href="errata32.html">3.2</a>,
           37 <a href="errata33.html">3.3</a>,
           38 <a href="errata34.html">3.4</a>,
           39 <a href="errata35.html">3.5</a>,
           40 <br>
           41 <a href="errata36.html">3.6</a>,
           42 <a href="errata37.html">3.7</a>,
           43 <a href="errata38.html">3.8</a>,
           44 <a href="errata39.html">3.9</a>,
           45 <a href="errata40.html">4.0</a>,
           46 <a href="errata41.html">4.1</a>,
           47 <a href="errata42.html">4.2</a>,
           48 <a href="errata43.html">4.3</a>,
           49 <a href="errata44.html">4.4</a>,
           50 <a href="errata45.html">4.5</a>,
           51 <a href="errata46.html">4.6</a>,
           52 <a href="errata47.html">4.7</a>,
           53 <a href="errata48.html">4.8</a>,
           54 <a href="errata49.html">4.9</a>,
           55 <a href="errata50.html">5.0</a>,
           56 <a href="errata51.html">5.1</a>,
           57 <br>
           58 <a href="errata52.html">5.2</a>,
           59 <a href="errata53.html">5.3</a>,
           60 <a href="errata54.html">5.4</a>,
           61 <a href="errata55.html">5.5</a>,
           62 <a href="errata56.html">5.6</a>,
           63 <a href="errata57.html">5.7</a>,
           64 <a href="errata58.html">5.8</a>,
           65 <a href="errata59.html">5.9</a>,
           66 <a href="errata60.html">6.0</a>,
           67 <a href="errata61.html">6.1</a>,
           68 <a href="errata62.html">6.2</a>,
           69 <a href="errata63.html">6.3</a>,
           70 <a href="errata64.html">6.4</a>,
           71 <a href="errata65.html">6.5</a>,
           72 <a href="errata66.html">6.6</a>,
           73 <a href="errata67.html">6.7</a>,
           74 <br>
           75 <a href="errata68.html">6.8</a>,
           76 <a href="errata69.html">6.9</a>,
           77 <a href="errata70.html">7.0</a>,
           78 <a href="errata71.html">7.1</a>,
           79 <a href="errata72.html">7.2</a>.
           80 <hr>
           81 
           82 <p>
           83 Patches for the OpenBSD base system are distributed as unified diffs.
           84 Each patch is cryptographically signed with the
           85 <a href="https://man.openbsd.org/OpenBSD-7.3/signify.1">signify(1)</a> tool and contains
           86 usage instructions.
           87 All the following patches are also available in one
           88 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3.tar.gz">tar.gz file</a>
           89 for convenience.
           90 
           91 <p>
           92 Alternatively, the <a href="https://man.openbsd.org/syspatch">syspatch(8)</a>
           93 utility can be used to apply binary updates on the following architectures:
           94 amd64, i386, arm64.
           95 
           96 <p>
           97 Patches for supported releases are also incorporated into the
           98 <a href="stable.html">-stable branch</a>, which is maintained for one year
           99 after release.
          100 
          101 <hr>
          102 
          103 <ul>
          104 
          105 <li id="p001_bgpd">
          106 <strong>001: RELIABILITY FIX: May 3, 2023</strong>
          107 &nbsp; <i>All architectures</i>
          108 <br>
          109 A new ASPA object appeared in the RPKI ecosystem and exposed bugs in
          110 bgpd(8) and rpki-client(8).
          111 <br>
          112 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/001_bgpd.patch.sig">
          113 A source code patch exists which remedies this problem.</a>
          114 <p>
          115 
          116 <li id="p002_bgpd">
          117 <strong>002: RELIABILITY FIX: May 16, 2023</strong>
          118 &nbsp; <i>All architectures</i>
          119 <br>
          120 Avoid fatal errors in bgpd(8) due to incorrect refcounting and mishandling
          121 of ASPA objects. Fix bgpctl(8) 'show rib in' by renaming 'invalid' into
          122 'disqualified'.
          123 <br>
          124 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/002_bgpd.patch.sig">
          125 A source code patch exists which remedies this problem.</a>
          126 <p>
          127 
          128 <li id="p003_rpki">
          129 <strong>003: RELIABILITY FIX: May 26, 2023</strong>
          130 &nbsp; <i>All architectures</i>
          131 <br>
          132 IP address inheritance was handled incorrectly in rpki-client(8).
          133 <br>
          134 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/003_rpki.patch.sig">
          135 A source code patch exists which remedies this problem.</a>
          136 <p>
          137 
          138 <li id="p004_ssl">
          139 <strong>004: SECURITY FIX: May 26, 2023</strong>
          140 &nbsp; <i>All architectures</i>
          141 <br>
          142 A double free or use after free could occur after SSL_clear(3).
          143 <br>
          144 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/004_ssl.patch.sig">
          145 A source code patch exists which remedies this problem.</a>
          146 <p>
          147 
          148 <li id="p005_libx11">
          149 <strong>005: SECURITY FIX: June 15, 2023</strong>
          150 &nbsp; <i>All architectures</i>
          151 <br>
          152 libX11 CVE-2023-3138 Missing checks in XQueryExtension() return values.
          153 <br>
          154 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/005_libx11.patch.sig">
          155 A source code patch exists which remedies this problem.</a>
          156 <p>
          157 
          158 <li id="p006_bgpd">
          159 <strong>006: RELIABILITY FIX: July 12, 2023</strong>
          160 &nbsp; <i>All architectures</i>
          161 <br>
          162 Incorrect length handling of path attributes in bgpd(8) can lead to a
          163 session reset.
          164 <br>
          165 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/006_bgpd.patch.sig">
          166 A source code patch exists which remedies this problem.</a>
          167 <p>
          168 
          169 <li id="p007_httpd">
          170 <strong>007: RELIABILITY FIX: July 12, 2023</strong>
          171 &nbsp; <i>All architectures</i>
          172 <br>
          173 A malformed HTTP request can crash httpd(8), if fastcgi is in use.
          174 <br>
          175 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/007_httpd.patch.sig">
          176 A source code patch exists which remedies this problem.</a>
          177 <p>
          178 
          179 <li id="p008_elf">
          180 <strong>008: RELIABILITY FIX: July 12, 2023</strong>
          181 &nbsp; <i>All architectures</i>
          182 <br>
          183 Incomplete validation of ELF headers in execve(2).
          184 <br>
          185 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/008_elf.patch.sig">
          186 A source code patch exists which remedies this problem.</a>
          187 <p>
          188 
          189 <li id="p009_bgpd">
          190 <strong>009: RELIABILITY FIX: July 12, 2023</strong>
          191 &nbsp; <i>All architectures</i>
          192 <br>
          193 When tracking nexthops over IPv6 multipath routes, or when receiving
          194 a NOTIFICATION while reaching an internal limit, bgpd(8) could crash.
          195 <br>
          196 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/009_bgpd.patch.sig">
          197 A source code patch exists which remedies this problem.</a>
          198 <p>
          199 
          200 <li id="p010_ssh_agent">
          201 <strong>010: SECURITY FIX: July 19, 2023</strong>
          202 &nbsp; <i>All architectures</i>
          203 <br>
          204 In ssh-agent(1)'s PKCS#11 provider support, remote execution was
          205 possible due to controllable access in low-quality libraries. In
          206 addition to fixing this, the ability to remotely load PKCS#11
          207 libraries is now disabled by default (re-enable with
          208 '-Oallow-remote-pkcs11').
          209 <br>
          210 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/010_ssh_agent.patch.sig">
          211 A source code patch exists which remedies this problem.</a>
          212 <p>
          213 
          214 <li id="p011_amdcpu">
          215 <strong>011: SECURITY FIX: July 24, 2023</strong>
          216 &nbsp; <i>amd64 i386</i>
          217 <br>
          218 Workaround for Zenbleed AMD cpu problem. For i386 and amd64 platforms.
          219 <br>
          220 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/011_amdcpu.patch.sig">
          221 A source code patch exists which remedies this problem.</a>
          222 <p>
          223 
          224 <li id="p012_amdfirmware">
          225 <strong>012: SECURITY FIX: July 24, 2023</strong>
          226 &nbsp; <i>amd64 i386</i>
          227 <br>
          228 Add firmware for AMD cpus, to repair past or potential future bugs.
          229 For i386 and amd64 platforms.
          230 <p>
          231 After this step, "fw_update" and "installboot" must be run.
          232 <br>
          233 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/012_amdfirmware.patch.sig">
          234 A source code patch exists which remedies this problem.</a>
          235 <p>
          236 
          237 <li id="p013_amdcpufirmware">
          238 <strong>013: SECURITY FIX: July 24, 2023</strong>
          239 &nbsp; <i>amd64 i386</i>
          240 <br>
          241 Install firmware updates for AMD cpus, to repair past or potential future bugs.
          242 For i386 and amd64 platforms.
          243 <br>
          244 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/013_amdcpufirmware.patch.sig">
          245 A source code patch exists which remedies this problem.</a>
          246 <p>
          247 
          248 <li id="p014_wscons">
          249 <strong>014: RELIABILITY FIX: July 24, 2023</strong>
          250 &nbsp; <i>All architectures</i>
          251 <br>
          252 Missing bounds check in console terminal emulation could cause a kernel
          253 crash after receiving specially crafted escape sequences.
          254 <br>
          255 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/014_wscons.patch.sig">
          256 A source code patch exists which remedies this problem.</a>
          257 <p>
          258 
          259 <li id="p015_hvamdcpu">
          260 <strong>015: RELIABILITY FIX: July 25, 2023</strong>
          261 &nbsp; <i>amd64 i386</i>
          262 <br>
          263 Some hypervisors remain unpatched for writes to Zenbleed DE_CFG bit,
          264 so skip it.
          265 <br>
          266 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/015_hvamdcpu.patch.sig">
          267 A source code patch exists which remedies this problem.</a>
          268 <p>
          269 
          270 </ul>
          271 
          272 <hr>