[BACK]Return to errata38.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata38.html between version 1.31 and 1.32

version 1.31, 2010/03/08 21:53:37 version 1.32, 2010/07/08 19:00:07
Line 54 
Line 54 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 94 
Line 94 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 106 
Line 106 
 Chris Evans. This could be exploited for DoS, limited kmem reads or local  Chris Evans. This could be exploited for DoS, limited kmem reads or local
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 123 
Line 123 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 135 
Line 135 
 style attacks.  style attacks.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 146 
Line 146 
 valid PKCS#1 v1.5 signature.  valid PKCS#1 v1.5 signature.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 162 
Line 162 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 174 
Line 174 
 connection causing the kernel to panic.  connection causing the kernel to panic.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 188 
Line 188 
 An attacker could reinject sniffed IPsec packets, which will be accepted without checking the  An attacker could reinject sniffed IPsec packets, which will be accepted without checking the
 replay counter.  replay counter.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 197 
Line 197 
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
 sempahores have been allocated.  sempahores have been allocated.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 210 
Line 210 
 to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.  to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/011_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/011_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 220 
Line 220 
 with really long header lines could trigger a use-after-free bug causing  with really long header lines could trigger a use-after-free bug causing
 sendmail to crash.  sendmail to crash.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 233 
Line 233 
 could be triggered remotely. The default install is not affected by the  could be triggered remotely. The default install is not affected by the
 buffer overflow. CVE-2006-3747  buffer overflow. CVE-2006-3747
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 246 
Line 246 
 delivered. However, mail messages in the queue may not be reattempted if a  delivered. However, mail messages in the queue may not be reattempted if a
 malformed MIME message exists.  malformed MIME message exists.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 257 
Line 257 
 Clients authorized to connect to the X server are able to crash it and to execute  Clients authorized to connect to the X server are able to crash it and to execute
 malicious code within the X server.  malicious code within the X server.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 267 
Line 267 
 asynchronous signals. A remote attacker may be able to execute arbitrary code with the  asynchronous signals. A remote attacker may be able to execute arbitrary code with the
 privileges of the user running sendmail, typically root.  privileges of the user running sendmail, typically root.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 281 
Line 281 
 This can be exploited to execute shell commands with privileges of the user running  This can be exploited to execute shell commands with privileges of the user running
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 292 
Line 292 
 so even root is blocked from accessing the ioports  so even root is blocked from accessing the ioports
 unless the machine is running at lower securelevels or with an open X11 aperture.  unless the machine is running at lower securelevels or with an open X11 aperture.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 307 
Line 307 
 requests need it to. This is now implemented using only GDT selectors  requests need it to. This is now implemented using only GDT selectors
 instead of the LDT so that it is more robust as well.  instead of the LDT so that it is more robust as well.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 315 
Line 315 
 <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 324 
Line 324 
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which
 may be exploitable under certain conditions.  may be exploitable under certain conditions.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 </ul>  </ul>

Legend:
Removed from v.1.31  
changed lines
  Added in v.1.32