[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.502 and 1.503

version 1.502, 2004/06/13 17:12:42 version 1.503, 2004/07/25 23:45:41
Line 56 
Line 56 
 <a name="all"></a>  <a name="all"></a>
 <h3><font color="#e00000">All architectures</font></h3>  <h3><font color="#e00000">All architectures</font></h3>
 <ul>  <ul>
   <li><a name="rnd"></a>
   <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font><br>
   Under a certain network load the kernel can run out of stack space.  This was
   encountered in an environment using CARP on a VLAN interface.  This issue initially
   manifested itself as a FPU related crash on boot up.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
 <font color="#009000"><strong>013: SECURITY FIX: Jun 12, 2004</strong></font><br>  <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 / mod_ssl.  / mod_ssl.
Line 70 
Line 79 
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>012: SECURITY FIX: Jun 10, 2004</strong></font><br>  <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font><br>
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
 by Thomas Walpuski  by Thomas Walpuski
Line 82 
Line 91 
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 <li><a name="cvs3"></a>  <li><a name="cvs3"></a>
 <font color="#009000"><strong>011: SECURITY FIX: Jun 9, 2004</strong></font><br>  <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server that allow an attacker to crash the server or possibly execute arbitrary  server that allow an attacker to crash the server or possibly execute arbitrary
Line 92 
Line 101 
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 <li><a name="fifofs"></a>  <li><a name="fifofs"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: Jun 9, 2004</strong></font><br>  <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font><br>
 A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in  A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in
 non-blocking mode for writing when there are no processes reading the FIFO.  non-blocking mode for writing when there are no processes reading the FIFO.
 One program affected by this is the <a href="http://www.qmail.org/">qmail</a>  One program affected by this is the <a href="http://www.qmail.org/">qmail</a>

Legend:
Removed from v.1.502  
changed lines
  Added in v.1.503