version 1.61, 2016/08/15 02:22:06 |
version 1.62, 2016/10/16 19:11:29 |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8.tar.gz"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
<p> |
<p> |
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
privilege escalation. |
privilege escalation. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
style attacks. |
style attacks. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
valid PKCS#1 v1.5 signature. |
valid PKCS#1 v1.5 signature. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
connection causing the kernel to panic. |
connection causing the kernel to panic. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
replay counter. |
replay counter. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
It is possible to cause the kernel to panic when more than the default number of |
It is possible to cause the kernel to panic when more than the default number of |
sempahores have been allocated. |
sempahores have been allocated. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. |
to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/011_dhcpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/011_dhcpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
with really long header lines could trigger a use-after-free bug causing |
with really long header lines could trigger a use-after-free bug causing |
sendmail to crash. |
sendmail to crash. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
could be triggered remotely. The default install is not affected by the |
could be triggered remotely. The default install is not affected by the |
buffer overflow. CVE-2006-3747 |
buffer overflow. CVE-2006-3747 |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
delivered. However, mail messages in the queue may not be reattempted if a |
delivered. However, mail messages in the queue may not be reattempted if a |
malformed MIME message exists. |
malformed MIME message exists. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
Clients authorized to connect to the X server are able to crash it and to execute |
Clients authorized to connect to the X server are able to crash it and to execute |
malicious code within the X server. |
malicious code within the X server. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
asynchronous signals. A remote attacker may be able to execute arbitrary code with the |
asynchronous signals. A remote attacker may be able to execute arbitrary code with the |
privileges of the user running sendmail, typically root. |
privileges of the user running sendmail, typically root. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
This can be exploited to execute shell commands with privileges of the user running |
This can be exploited to execute shell commands with privileges of the user running |
<a href="http://man.openbsd.org/?query=scp&sektion=1">scp(1)</a>. |
<a href="http://man.openbsd.org/?query=scp&sektion=1">scp(1)</a>. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
so even root is blocked from accessing the ioports |
so even root is blocked from accessing the ioports |
unless the machine is running at lower securelevels or with an open X11 aperture. |
unless the machine is running at lower securelevels or with an open X11 aperture. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
requests need it to. This is now implemented using only GDT selectors |
requests need it to. This is now implemented using only GDT selectors |
instead of the LDT so that it is more robust as well. |
instead of the LDT so that it is more robust as well. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
may be exploitable under certain conditions. |
may be exploitable under certain conditions. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|