version 1.502, 2004/06/13 17:12:42 |
version 1.503, 2004/07/25 23:45:41 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="rnd"></a> |
|
<font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font><br> |
|
Under a certain network load the kernel can run out of stack space. This was |
|
encountered in an environment using CARP on a VLAN interface. This issue initially |
|
manifested itself as a FPU related crash on boot up. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="httpd"></a> |
<li><a name="httpd"></a> |
<font color="#009000"><strong>013: SECURITY FIX: Jun 12, 2004</strong></font><br> |
<font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font><br> |
Multiple vulnerabilities have been found in |
Multiple vulnerabilities have been found in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
/ mod_ssl. |
/ mod_ssl. |
|
|
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
<li><a name="isakmpd"></a> |
<li><a name="isakmpd"></a> |
<font color="#009000"><strong>012: SECURITY FIX: Jun 10, 2004</strong></font><br> |
<font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font><br> |
As |
As |
<a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a> |
<a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a> |
by Thomas Walpuski |
by Thomas Walpuski |
|
|
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
<li><a name="cvs3"></a> |
<li><a name="cvs3"></a> |
<font color="#009000"><strong>011: SECURITY FIX: Jun 9, 2004</strong></font><br> |
<font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font><br> |
Multiple remote vulnerabilities have been found in the |
Multiple remote vulnerabilities have been found in the |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&apropos=0&sektion=1&manpath=OpenBSD+Current&arch=i386&format=html">cvs(1)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&apropos=0&sektion=1&manpath=OpenBSD+Current&arch=i386&format=html">cvs(1)</a> |
server that allow an attacker to crash the server or possibly execute arbitrary |
server that allow an attacker to crash the server or possibly execute arbitrary |
|
|
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
<li><a name="fifofs"></a> |
<li><a name="fifofs"></a> |
<font color="#009000"><strong>010: RELIABILITY FIX: Jun 9, 2004</strong></font><br> |
<font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font><br> |
A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in |
A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in |
non-blocking mode for writing when there are no processes reading the FIFO. |
non-blocking mode for writing when there are no processes reading the FIFO. |
One program affected by this is the <a href="http://www.qmail.org/">qmail</a> |
One program affected by this is the <a href="http://www.qmail.org/">qmail</a> |