[BACK]Return to errata37.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata37.html between version 1.66 and 1.67

version 1.66, 2019/04/02 12:46:57 version 1.67, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.7 Errata</title>  <title>OpenBSD 3.7 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata37.html">  <link rel="canonical" href="https://www.openbsd.org/errata37.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.7 Errata</font>  3.7 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="xorg">  <li id="xorg">
 <font color="#009000"><strong>013: SECURITY FIX: May 2, 2006</strong></font>  <strong>013: SECURITY FIX: May 2, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server &ndash;
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.
 Clients authorized to connect to the X server are able to crash it and to execute  Clients authorized to connect to the X server are able to crash it and to execute
 malicious code within the X server.  malicious code within the X server.
Line 100 
Line 98 
 <p>  <p>
   
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font>  <strong>012: SECURITY FIX: March 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
 asynchronous signals. A remote attacker may be able to execute arbitrary code with the  asynchronous signals. A remote attacker may be able to execute arbitrary code with the
Line 111 
Line 109 
 <p>  <p>
   
 <li id="ssh">  <li id="ssh">
 <font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font>  <strong>011: SECURITY FIX: February 12, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
 <a href="https://man.openbsd.org/OpenBSD-3.7/system.3">system(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/system.3">system(3)</a>
Line 126 
Line 124 
 <p>  <p>
   
 <li id="i386machdep">  <li id="i386machdep">
 <font color="#009000"><strong>010: RELIABILITY FIX: January 13, 2006</strong></font>  <strong>010: RELIABILITY FIX: January 13, 2006</strong>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Constrain  Constrain
 <a href="https://man.openbsd.org/OpenBSD-3.7/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a>
Line 138 
Line 136 
 <p>  <p>
   
 <li id="i386pmap">  <li id="i386pmap">
 <font color="#009000"><strong>009: RELIABILITY FIX: January 13, 2006</strong></font>  <strong>009: RELIABILITY FIX: January 13, 2006</strong>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Change the implementation of i386 W^X so that the "execute line" can move around.
 Before it was limited to being either at 512MB (below which all code normally  Before it was limited to being either at 512MB (below which all code normally
Line 154 
Line 152 
 <p>  <p>
   
 <li id="fd">  <li id="fd">
 <font color="#009000"><strong>008: SECURITY FIX: January 5, 2006</strong></font>  <strong>008: SECURITY FIX: January 5, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
 <br>  <br>
Line 163 
Line 161 
 <p>  <p>
   
 <li id="perl">  <li id="perl">
 <font color="#009000"><strong>007: SECURITY FIX: January 5, 2006</strong></font>  <strong>007: SECURITY FIX: January 5, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which
 may be exploitable under certain conditions.  may be exploitable under certain conditions.
Line 173 
Line 171 
 <p>  <p>
   
 <li id="nat-t">  <li id="nat-t">
 <font color="#009000"><strong>006: RELIABILITY FIX: November 5, 2005</strong></font>  <strong>006: RELIABILITY FIX: November 5, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to wrong advertisement of RFC 3947 compliance interoperability problems with  Due to wrong advertisement of RFC 3947 compliance interoperability problems with
 <a href="https://man.openbsd.org/OpenBSD-3.7/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/isakmpd.8">isakmpd(8)</a>
Line 184 
Line 182 
 <p>  <p>
   
 <li id="libz2">  <li id="libz2">
 <font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font>  <strong>005: SECURITY FIX: July 21, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="https://man.openbsd.org/OpenBSD-3.7/compress.3">compress(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/compress.3">compress(3)</a>
Line 196 
Line 194 
 <p>  <p>
   
 <li id="libz">  <li id="libz">
 <font color="#009000"><strong>004: SECURITY FIX: July 6, 2005</strong></font>  <strong>004: SECURITY FIX: July 6, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
 <a href="https://man.openbsd.org/OpenBSD-3.7/compress.3">compress(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/compress.3">compress(3)</a>
Line 207 
Line 205 
 <p>  <p>
   
 <li id="sudo">  <li id="sudo">
 <font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font>  <strong>003: SECURITY FIX: June 20, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a race condition in its command pathname handling, a user with  Due to a race condition in its command pathname handling, a user with
 <a href="https://man.openbsd.org/OpenBSD-3.7/sudo.8">sudo(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/sudo.8">sudo(8)</a>
 privileges may be able to run arbitrary commands if the user's entry  privileges may be able to run arbitrary commands if the user's entry
 is followed by an entry that grants <tt>sudo ALL</tt> privileges to  is followed by an entry that grants <code>sudo ALL</code> privileges to
 another user.  another user.
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/003_sudo.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/003_sudo.patch">
Line 220 
Line 218 
 <p>  <p>
   
 <li id="getsockopt">  <li id="getsockopt">
 <font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font>  <strong>002: RELIABILITY FIX: June 15, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As discovered by Stefan Miltchev calling  As discovered by Stefan Miltchev calling
 <a href="https://man.openbsd.org/OpenBSD-3.7/getsockopt.2">getsockopt(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.7/getsockopt.2">getsockopt(2)</a>
Line 233 
Line 231 
 <p>  <p>
   
 <li id="cvs">  <li id="cvs">
 <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font>  <strong>001: SECURITY FIX: June 7, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
   
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
Line 249 
Line 247 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.66  
changed lines
  Added in v.1.67