===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata33.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -r1.50 -r1.51
--- www/errata33.html 2014/03/28 03:04:30 1.50
+++ www/errata33.html 2014/03/31 03:12:47 1.51
@@ -6,7 +6,6 @@
-
@@ -44,7 +43,7 @@
3.9,
4.0,
4.1,
-4.1,
+4.2,
4.3,
4.4,
4.5,
@@ -65,21 +64,23 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_3_3
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
All architectures
-
-022: SECURITY FIX: May 5,
-2004
+022: SECURITY FIX: May 5, 2004
Pathname validation problems have been found in
cvs(1),
allowing malicious clients to create files outside the repository, allowing
@@ -88,22 +89,20 @@
repository.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
-021: RELIABILITY FIX: March 17,
-2004
+021: RELIABILITY FIX: March 17, 2004
A missing check for a NULL-pointer dereference has been found in
ssl(3).
A remote attacker can use the bug to cause an OpenSSL application to crash;
this may lead to a denial of service.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
-020: RELIABILITY FIX: March 17,
-2004
+020: RELIABILITY FIX: March 17, 2004
Defects in the payload validation and processing functions of
isakmpd(8)
have been discovered. An attacker could send malformed ISAKMP messages and
@@ -111,39 +110,36 @@
and removes some memory leaks.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
-019: SECURITY FIX: March 13,
-2004
+019: SECURITY FIX: March 13, 2004
Due to a bug in the parsing of Allow/Deny rules for
httpd(8)'s
access module, using IP addresses without a netmask on big endian 64-bit
platforms causes the rules to fail to match. This only affects sparc64.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
-018: RELIABILITY FIX: March 8,
-2004
+018: RELIABILITY FIX: March 8, 2004
OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
TCP segments are queued in the system. An attacker could
send out-of-order TCP segments and trick the system into using all
available memory buffers.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
-017: RELIABILITY FIX: February 14,
-2004
+017: RELIABILITY FIX: February 14, 2004
Several buffer overflows exist in the code parsing
font.aliases files in XFree86. Thanks to ProPolice, these cannot be
exploited to gain privileges, but they can cause the X server to abort.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
016: SECURITY FIX: February 8, 2004
@@ -152,7 +148,7 @@
TCP ports.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
015: SECURITY FIX: February 5, 2004
@@ -162,7 +158,7 @@
under certain circumstances.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
014: SECURITY FIX: January 15, 2004
@@ -171,7 +167,7 @@
have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs.
-A source code patch exists which remedies these problems.
+A source code patch exists which remedies this problem.
-
013: RELIABILITY FIX: November 20, 2003
@@ -182,21 +178,21 @@
certain arguments.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
012: RELIABILITY FIX: November 20, 2003
It is possible for a local user to cause a crash via
sysctl(3) with certain arguments.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
010: RELIABILITY FIX: November 4, 2003
It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
009: RELIABILITY FIX: October 29, 2003
@@ -207,14 +203,14 @@
is believed that ProPolice will prevent code execution).
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
008: RELIABILITY FIX: October 1, 2003
It is possible for a local user to cause a system panic by flooding it with spoofed ARP
requests.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
007: SECURITY FIX: October 1, 2003
@@ -223,7 +219,7 @@
ssl(3).
This does not affect OpenSSH.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
006: SECURITY FIX: September 24, 2003
@@ -231,7 +227,7 @@
pf(4).
At least one of them could be used to panic pf with active scrub rules remotely.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
005: SECURITY FIX: September 17, 2003
@@ -239,7 +235,7 @@
sendmail(8)
may allow an attacker to gain root privileges.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
NOTE: this is the second revision of the patch that fixes an additional
problem.
@@ -247,8 +243,8 @@
004: SECURITY FIX: September 16, 2003
All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
It is unclear whether or not this bug is exploitable.
-A
-source code patch exists which remedies the problem.
+
+A source code patch exists which remedies this problem.
NOTE: this is the second revision of the patch that fixes an additional
problem.
@@ -257,7 +253,7 @@
Root may be able to reduce the security level by taking advantage of
an integer overflow when the semaphore limits are made very large.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
002: RELIABILITY FIX: August 20, 2003
@@ -265,7 +261,7 @@
semget(2)
system call can allow a local user to cause a kernel panic.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
001: SECURITY FIX: August 4, 2003
@@ -275,7 +271,7 @@
it is possible that this bug may allow an attacker to gain escalated privileges
on OpenBSD.
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
@@ -288,62 +284,10 @@
privileges due to a stack overrun in
compat_ibcs2(8).
-A source code patch exists which remedies the problem.
+A source code patch exists which remedies this problem.
-
-
alpha
-
-- No problems identified yet.
-
-
-
-
mac68k
-
-- No problems identified yet.
-
-
-
-
sparc
-
-- No problems identified yet.
-
-
-
-
sparc64
-
-- No problems identified yet.
-
-
-
-
hppa
-
-- No problems identified yet.
-
-
-
-
hp300
-
-- No problems identified yet.
-
-
-
-
mvme68k
-
-- No problems identified yet.
-
-
-
-
macppc
-
-- No problems identified yet.
-
-
-
-
vax
-
-- No problems identified yet.