[BACK]Return to errata33.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata33.html between version 1.57 and 1.58

version 1.57, 2014/10/02 14:34:45 version 1.58, 2015/02/14 04:36:51
Line 82 
Line 82 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="cvs"></a>  <li id="cvs">
 <font color="#009000"><strong>022: SECURITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>022: SECURITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
Line 95 
Line 95 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/022_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/022_cvs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssl"></a>  <li id="openssl">
 <font color="#009000"><strong>021: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>021: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
Line 106 
Line 106 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/021_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/021_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd2"></a>  <li id="isakmpd2">
 <font color="#009000"><strong>020: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>020: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
Line 118 
Line 118 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li id="httpd2">
 <font color="#009000"><strong>019: SECURITY FIX: March 13, 2004</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: March 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
Line 129 
Line 129 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/019_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/019_httpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li id="tcp">
 <font color="#009000"><strong>018: RELIABILITY FIX: March 8, 2004</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: March 8, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD's TCP/IP stack did not impose limits on how many out-of-order  OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
Line 140 
Line 140 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/018_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/018_tcp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="font"></a>  <li id="font">
 <font color="#009000"><strong>017: RELIABILITY FIX: February 14, 2004</strong></font>  <font color="#009000"><strong>017: RELIABILITY FIX: February 14, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several buffer overflows exist in the code parsing  Several buffer overflows exist in the code parsing
Line 150 
Line 150 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/017_font.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/017_font.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ip6"></a>  <li id="ip6">
 <font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An IPv6 MTU handling problem exists that could be used by an attacker  An IPv6 MTU handling problem exists that could be used by an attacker
Line 160 
Line 160 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/016_ip6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/016_ip6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li id="sysvshm">
 <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A reference counting bug exists in the  A reference counting bug exists in the
Line 171 
Line 171 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/015_sysvshm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/015_sysvshm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>014: SECURITY FIX: January 15, 2004</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: January 15, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several message handling flaws in  Several message handling flaws in
Line 181 
Line 181 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/014_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/014_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sem"></a>  <li id="sem">
 <font color="#009000"><strong>013: RELIABILITY FIX: November 20, 2003</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: November 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An improper bounds check makes it possible for a local user to cause a crash  An improper bounds check makes it possible for a local user to cause a crash
Line 193 
Line 193 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/013_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/013_sem.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uvm"></a>  <li id="uvm">
 <font color="#009000"><strong>012: RELIABILITY FIX: November 20, 2003</strong></font>  <font color="#009000"><strong>012: RELIABILITY FIX: November 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
Line 201 
Line 201 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   <li id="ibcs2">
 <a name="i386"></a>  <a name="i386"></a>
 <li><a name="ibcs2"></a>  
 <font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: November 17, 2003</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 It is possible for a local user to execute arbitrary code resulting in escalation of  It is possible for a local user to execute arbitrary code resulting in escalation of
Line 211 
Line 211 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="exec"></a>  <li id="exec">
 <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
Line 219 
Line 219 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/010_exec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/010_exec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>009: RELIABILITY FIX: October 29, 2003</strong></font>  <font color="#009000"><strong>009: RELIABILITY FIX: October 29, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>  A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>
Line 231 
Line 231 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/009_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/009_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="arp"></a>  <li id="arp">
 <font color="#009000"><strong>008: RELIABILITY FIX: October 1, 2003</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: October 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by flooding it with spoofed ARP  It is possible for a local user to cause a system panic by flooding it with spoofed ARP
Line 239 
Line 239 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/008_arp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/008_arp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="asn1"></a>  <li id="asn1">
 <font color="#009000"><strong>007: SECURITY FIX: October 1, 2003</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: October 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The use of certain ASN.1 encodings or malformed public keys may allow an  The use of certain ASN.1 encodings or malformed public keys may allow an
Line 249 
Line 249 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/007_asn1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/007_asn1.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pfnorm"></a>  <li id="pfnorm">
 <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Three cases of potential access to freed memory have been found in  Three cases of potential access to freed memory have been found in
Line 258 
Line 258 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow in the address parsing in  A buffer overflow in the address parsing in
Line 269 
Line 269 
 NOTE: this is the <em>second</em> revision of the patch that fixes an additional  NOTE: this is the <em>second</em> revision of the patch that fixes an additional
 problem.  problem.
 <p>  <p>
 <li><a name="sshbuffer"></a>  <li id="sshbuffer">
 <font color="#009000"><strong>004: SECURITY FIX: September 16, 2003</strong></font>  <font color="#009000"><strong>004: SECURITY FIX: September 16, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.  All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
Line 279 
Line 279 
 NOTE: this is the <em>second</em> revision of the patch that fixes an additional  NOTE: this is the <em>second</em> revision of the patch that fixes an additional
 problem.  problem.
 <p>  <p>
 <li><a name="sysvsem"></a>  <li id="sysvsem">
 <font color="#009000"><strong>003: SECURITY FIX: September 10, 2003</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: September 10, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Root may be able to reduce the security level by taking advantage of  Root may be able to reduce the security level by taking advantage of
Line 287 
Line 287 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/003_sysvsem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/003_sysvsem.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="semget"></a>  <li id="semget">
 <font color="#009000"><strong>002: RELIABILITY FIX: August 20, 2003</strong></font>  <font color="#009000"><strong>002: RELIABILITY FIX: August 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An improper bounds check in the  An improper bounds check in the
Line 296 
Line 296 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/002_semget.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/002_semget.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="realpath"></a>  <li id="realpath">
 <font color="#009000"><strong>001: SECURITY FIX: August 4, 2003</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: August 4, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An off-by-one error exists in the C library function  An off-by-one error exists in the C library function

Legend:
Removed from v.1.57  
changed lines
  Added in v.1.58