[BACK]Return to errata36.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata36.html between version 1.34 and 1.35

version 1.34, 2014/03/31 03:12:47 version 1.35, 2014/03/31 16:02:48
Line 79 
Line 79 
 <ul>  <ul>
   
 <li><a name="libz2"></a>  <li><a name="libz2"></a>
 <font color="#009000"><strong>020: SECURITY FIX: July 21, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>020: SECURITY FIX: July 21, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>
 which may be exploitable.<br>  which may be exploitable.<br>
Line 90 
Line 91 
 <p>  <p>
   
 <li><a name="libz"></a>  <li><a name="libz"></a>
 <font color="#009000"><strong>019: SECURITY FIX: July 6, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>019: SECURITY FIX: July 6, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>
 which may be exploitable.  which may be exploitable.
Line 100 
Line 102 
 <p>  <p>
   
 <li><a name="sudo"></a>  <li><a name="sudo"></a>
 <font color="#009000"><strong>018: SECURITY FIX: June 20, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>018: SECURITY FIX: June 20, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Due to a race condition in its command pathname handling, a user with  Due to a race condition in its command pathname handling, a user with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a>
 privileges may be able to run arbitrary commands if the user's entry  privileges may be able to run arbitrary commands if the user's entry
Line 112 
Line 115 
 <p>  <p>
   
 <li><a name="getsockopt"></a>  <li><a name="getsockopt"></a>
 <font color="#009000"><strong>017: RELIABILITY FIX: June 15, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>017: RELIABILITY FIX: June 15, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 As discovered by Stefan Miltchev calling  As discovered by Stefan Miltchev calling
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getsockopt&sektion=2">getsockopt(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getsockopt&sektion=2">getsockopt(2)</a>
 to get  to get
Line 124 
Line 128 
 <p>  <p>
   
 <li><a name="cvs"></a>  <li><a name="cvs"></a>
 <font color="#009000"><strong>016: SECURITY FIX: April 28, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>016: SECURITY FIX: April 28, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>
 . None of these issues are known to be exploitable.  . None of these issues are known to be exploitable.
Line 136 
Line 141 
 <p>  <p>
   
 <li><a name="tcp"></a>  <li><a name="tcp"></a>
 <font color="#009000"><strong>015: RELIABILITY FIX: April 4, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>015: RELIABILITY FIX: April 4, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Handle an edge condition in  Handle an edge condition in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>
 timestamps.  timestamps.
Line 146 
Line 152 
 <p>  <p>
   
 <li><a name="telnet"></a>  <li><a name="telnet"></a>
 <font color="#009000"><strong>014: SECURITY FIX: March 30, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>014: SECURITY FIX: March 30, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Due to buffer overflows in  Due to buffer overflows in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=telnet&sektion=1">telnet(1)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=telnet&sektion=1">telnet(1)</a>,
 a malicious server or man-in-the-middle attack could allow execution of  a malicious server or man-in-the-middle attack could allow execution of
Line 160 
Line 167 
 <p>  <p>
   
 <li><a name="sack"></a>  <li><a name="sack"></a>
 <font color="#009000"><strong>013: RELIABILITY FIX: March 30, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: RELIABILITY FIX: March 30, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Bugs in the  Bugs in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>
 stack can lead to memory exhaustion or processing of TCP segments with  stack can lead to memory exhaustion or processing of TCP segments with
Line 171 
Line 179 
 <p>  <p>
   
 <li><a name="copy"></a>  <li><a name="copy"></a>
 <font color="#009000"><strong>012: SECURITY FIX: March 16, 2005</strong></font> &nbsp; <strong>amd64 only</strong><br>  <font color="#009000"><strong>012: SECURITY FIX: March 16, 2005</strong></font>
   &nbsp; <strong>amd64 only</strong><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&sektion=9">copy(9)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&sektion=9">copy(9)</a>
 functions to prevent their misuse.  functions to prevent their misuse.
Line 181 
Line 190 
 <p>  <p>
   
 <li><a name="locore"></a>  <li><a name="locore"></a>
 <font color="#009000"><strong>011: SECURITY FIX: February 28, 2005</strong></font> &nbsp; <strong>i386 only</strong><br>  <font color="#009000"><strong>011: SECURITY FIX: February 28, 2005</strong></font>
   &nbsp; <strong>i386 only</strong><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&sektion=9">copy(9)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&sektion=9">copy(9)</a>
 functions to prevent their misuse.  functions to prevent their misuse.
Line 191 
Line 201 
 <p>  <p>
   
 <li><a name="rtt"></a>  <li><a name="rtt"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: January 11, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: January 11, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 A bug in the  A bug in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>
 stack allows an invalid argument to be used in calculating the TCP  stack allows an invalid argument to be used in calculating the TCP
Line 203 
Line 214 
 <p>  <p>
   
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
 <font color="#009000"><strong>009: SECURITY FIX: January 12, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: January 12, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a>
 's mod_include module fails to properly validate the length of  's mod_include module fails to properly validate the length of
 user supplied tag strings prior to copying them to a local buffer,  user supplied tag strings prior to copying them to a local buffer,
Line 217 
Line 229 
 <p>  <p>
   
 <li><a name="getcwd"></a>  <li><a name="getcwd"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: January 6, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: RELIABILITY FIX: January 6, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 The  The
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getcwd&sektion=3">getcwd(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getcwd&sektion=3">getcwd(3)</a>
 library function contains a memory management error, which causes failure  library function contains a memory management error, which causes failure
Line 228 
Line 241 
 <p>  <p>
   
 <li><a name="pfkey"></a>  <li><a name="pfkey"></a>
 <font color="#009000"><strong>007: SECURITY FIX: December 14, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: SECURITY FIX: December 14, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>
 it is possible for a local user to cause kernel memory corruption  it is possible for a local user to cause kernel memory corruption
Line 241 
Line 255 
 <p>  <p>
   
 <li><a name="xl"></a>  <li><a name="xl"></a>
 <font color="#009000"><strong>006: RELIABILITY FIX: November 21, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>006: RELIABILITY FIX: November 21, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 Fix for transmit side breakage on macppc and mbuf leaks with  Fix for transmit side breakage on macppc and mbuf leaks with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a>.
 <br>  <br>
Line 250 
Line 265 
 <p>  <p>
   
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: November 21, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: RELIABILITY FIX: November 21, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 Wrong calculation of NAT-D payloads may cause interoperability problems between  Wrong calculation of NAT-D payloads may cause interoperability problems between
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>
 and other ISAKMP/IKE implementations.  and other ISAKMP/IKE implementations.
Line 260 
Line 276 
   
 <p>  <p>
 <li><a name="lynx"></a>  <li><a name="lynx"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: November 10, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: November 10, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&sektion=1">lynx(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&sektion=1">lynx(1)</a>
 it is possible for pages such as  it is possible for pages such as
Line 274 
Line 291 
 <p>  <p>
   
 <li><a name="pppd"></a>  <li><a name="pppd"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: November 10, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>003: RELIABILITY FIX: November 10, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&sektion=8">pppd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&sektion=8">pppd(8)</a>
 contains a bug that allows an attacker to crash his own connection, but it cannot  contains a bug that allows an attacker to crash his own connection, but it cannot
 be used to deny service to other users.  be used to deny service to other users.
Line 284 
Line 302 
 <p>  <p>
   
 <li><a name="bind"></a>  <li><a name="bind"></a>
 <font color="#009000"><strong>002: RELIABILITY FIX: November 10, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: RELIABILITY FIX: November 10, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in  BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in
 cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and  cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and
 thus slow DNS queries.  thus slow DNS queries.
Line 294 
Line 313 
 <p>  <p>
   
 <li><a name="st"></a>  <li><a name="st"></a>
 <font color="#009000"><strong>001: RELIABILITY FIX: November 10, 2004</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: RELIABILITY FIX: November 10, 2004</strong></font>
   &nbsp; <i>All architectures</i><br>
 Fix detection of tape blocksize during device open. Corrects problem with  Fix detection of tape blocksize during device open. Corrects problem with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=restore&sektion=8">restore(8)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=restore&sektion=8">restore(8)</a>.
 <br>  <br>

Legend:
Removed from v.1.34  
changed lines
  Added in v.1.35