[BACK]Return to errata37.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata37.html between version 1.40 and 1.41

version 1.40, 2014/03/31 03:12:47 version 1.41, 2014/03/31 16:02:48
Line 79 
Line 79 
 <ul>  <ul>
   
 <li><a name="xorg"></a>  <li><a name="xorg"></a>
 <font color="#009000"><strong>013: SECURITY FIX: May 2, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: SECURITY FIX: May 2, 2006</strong></font>
   &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.
 Clients authorized to connect to the X server are able to crash it and to execute  Clients authorized to connect to the X server are able to crash it and to execute
Line 90 
Line 91 
 <p>  <p>
   
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
 <font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font>
   &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
 asynchronous signals. A remote attacker may be able to execute arbitrary code with the  asynchronous signals. A remote attacker may be able to execute arbitrary code with the
 privileges of the user running sendmail, typically root.  privileges of the user running sendmail, typically root.
Line 100 
Line 102 
 <p>  <p>
   
 <li><a name="ssh"></a>  <li><a name="ssh"></a>
 <font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font>
   &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=system&amp;sektion=3">system(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=system&amp;sektion=3">system(3)</a>
 function in  function in
Line 114 
Line 117 
 <p>  <p>
   
 <li><a name="i386machdep"></a>  <li><a name="i386machdep"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: January 13, 2006</strong></font> &nbsp; <i>i386 architecture</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: January 13, 2006</strong></font>
   &nbsp; <i>i386 architecture</i><br>
 Constrain  Constrain
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=i386_set_ioperm&amp;arch=i386&amp;sektion=2">i386_set_ioperm(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=i386_set_ioperm&amp;arch=i386&amp;sektion=2">i386_set_ioperm(2)</a>
 so even root is blocked from accessing the ioports  so even root is blocked from accessing the ioports
Line 125 
Line 129 
 <p>  <p>
   
 <li><a name="i386pmap"></a>  <li><a name="i386pmap"></a>
 <font color="#009000"><strong>009: RELIABILITY FIX: January 13, 2006</strong></font> &nbsp; <i>i386 architecture</i><br>  <font color="#009000"><strong>009: RELIABILITY FIX: January 13, 2006</strong></font>
   &nbsp; <i>i386 architecture</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Change the implementation of i386 W^X so that the "execute line" can move around.
 Before it was limited to being either at 512MB (below which all code normally  Before it was limited to being either at 512MB (below which all code normally
 lands) or at the top of the stack. Now the line can float as  lands) or at the top of the stack. Now the line can float as
Line 140 
Line 145 
 <p>  <p>
   
 <li><a name="fd"></a>  <li><a name="fd"></a>
 <font color="#009000"><strong>008: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: SECURITY FIX: January 5, 2006</strong></font>
   &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/008_fd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/008_fd.patch">
Line 148 
Line 154 
 <p>  <p>
   
 <li><a name="perl"></a>  <li><a name="perl"></a>
 <font color="#009000"><strong>007: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: SECURITY FIX: January 5, 2006</strong></font>
   &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which
 may be exploitable under certain conditions.  may be exploitable under certain conditions.
 <br>  <br>
Line 157 
Line 164 
 <p>  <p>
   
 <li><a name="nat-t"></a>  <li><a name="nat-t"></a>
 <font color="#009000"><strong>006: RELIABILITY FIX: November 5, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>006: RELIABILITY FIX: November 5, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Due to wrong advertisement of RFC 3947 compliance interoperability problems with  Due to wrong advertisement of RFC 3947 compliance interoperability problems with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&sektion=8">isakmpd(8)</a>
 may occur.  may occur.
Line 167 
Line 175 
 <p>  <p>
   
 <li><a name="libz2"></a>  <li><a name="libz2"></a>
 <font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>
 which may be exploitable.<br>  which may be exploitable.<br>
Line 178 
Line 187 
 <p>  <p>
   
 <li><a name="libz"></a>  <li><a name="libz"></a>
 <font color="#009000"><strong>004: SECURITY FIX: July 6, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: SECURITY FIX: July 6, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compress&sektion=3">compress(3)</a>
 which may be exploitable.  which may be exploitable.
Line 188 
Line 198 
 <p>  <p>
   
 <li><a name="sudo"></a>  <li><a name="sudo"></a>
 <font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 Due to a race condition in its command pathname handling, a user with  Due to a race condition in its command pathname handling, a user with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo(8)</a>
 privileges may be able to run arbitrary commands if the user's entry  privileges may be able to run arbitrary commands if the user's entry
Line 200 
Line 211 
 <p>  <p>
   
 <li><a name="getsockopt"></a>  <li><a name="getsockopt"></a>
 <font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
 As discovered by Stefan Miltchev calling  As discovered by Stefan Miltchev calling
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getsockopt&sektion=2">getsockopt(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getsockopt&sektion=2">getsockopt(2)</a>
 to get  to get
Line 212 
Line 224 
 <p>  <p>
   
 <li><a name="cvs"></a>  <li><a name="cvs"></a>
 <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font>
   &nbsp; <i>All architectures</i><br>
   
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>

Legend:
Removed from v.1.40  
changed lines
  Added in v.1.41