[BACK]Return to errata38.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata38.html between version 1.70 and 1.71

version 1.70, 2019/04/02 12:46:57 version 1.71, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.8 Errata</title>  <title>OpenBSD 3.8 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata38.html">  <link rel="canonical" href="https://www.openbsd.org/errata38.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.8 Errata</font>  3.8 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="ssh2">  <li id="ssh2">
 <font color="#009000"><strong>020: SECURITY FIX: October 12, 2006</strong></font>  <strong>020: SECURITY FIX: October 12, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found  Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
 by Tavis Ormandy) that would cause  by Tavis Ormandy) that would cause
Line 104 
Line 102 
 <p>  <p>
   
 <li id="systrace">  <li id="systrace">
 <font color="#009000"><strong>019: SECURITY FIX: October 7, 2006</strong></font>  <strong>019: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
 <a href="https://man.openbsd.org/OpenBSD-3.8/systrace.4">systrace(4)</a>'s  <a href="https://man.openbsd.org/OpenBSD-3.8/systrace.4">systrace(4)</a>'s
Line 117 
Line 115 
 <p>  <p>
   
 <li id="openssl2">  <li id="openssl2">
 <font color="#009000"><strong>018: SECURITY FIX: October 7, 2006</strong></font>  <strong>018: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
 structures an error condition is mishandled, possibly resulting in an infinite  structures an error condition is mishandled, possibly resulting in an infinite
Line 135 
Line 133 
 <p>  <p>
   
 <li id="httpd2">  <li id="httpd2">
 <font color="#009000"><strong>017: SECURITY FIX: October 7, 2006</strong></font>  <strong>017: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>
 does not sanitize the Expect header from an HTTP request when it is  does not sanitize the Expect header from an HTTP request when it is
Line 148 
Line 146 
 <p>  <p>
   
 <li id="openssl">  <li id="openssl">
 <font color="#009000"><strong>016: SECURITY FIX: September 8, 2006</strong></font>  <strong>016: SECURITY FIX: September 8, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for  Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
 an attacker to construct an invalid signature which OpenSSL would accept as a  an attacker to construct an invalid signature which OpenSSL would accept as a
Line 160 
Line 158 
 <p>  <p>
   
 <li id="bind">  <li id="bind">
 <font color="#009000"><strong>015: SECURITY FIX: September 8, 2006</strong></font>  <strong>015: SECURITY FIX: September 8, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two Denial of Service issues have been found with BIND.  Two Denial of Service issues have been found with BIND.
 An attacker who can perform recursive lookups on a DNS server and is able  An attacker who can perform recursive lookups on a DNS server and is able
Line 177 
Line 175 
 <p>  <p>
   
 <li id="sppp">  <li id="sppp">
 <font color="#009000"><strong>014: SECURITY FIX: September 2, 2006</strong></font>  <strong>014: SECURITY FIX: September 2, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to the failure to correctly validate LCP configuration option lengths,  Due to the failure to correctly validate LCP configuration option lengths,
 it is possible for an attacker to send LCP packets via an  it is possible for an attacker to send LCP packets via an
Line 190 
Line 188 
 <p>  <p>
   
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>013: SECURITY FIX: August 25, 2006</strong></font>  <strong>013: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem in  A problem in
 <a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a>
Line 205 
Line 203 
 <p>  <p>
   
 <li id="sem">  <li id="sem">
 <font color="#009000"><strong>012: SECURITY FIX: August 25, 2006</strong></font>  <strong>012: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
 sempahores have been allocated.  sempahores have been allocated.
Line 215 
Line 213 
 <p>  <p>
   
 <li id="dhcpd">  <li id="dhcpd">
 <font color="#009000"><strong>011: SECURITY FIX: August 25, 2006</strong></font>  <strong>011: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to an off-by-one error in  Due to an off-by-one error in
 <a href="https://man.openbsd.org/OpenBSD-3.8/dhcpd.8">dhcpd(8)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.8/dhcpd.8">dhcpd(8)</a>,
Line 229 
Line 227 
 <p>  <p>
   
 <li id="sendmail3">  <li id="sendmail3">
 <font color="#009000"><strong>010: SECURITY FIX: August 25, 2006</strong></font>  <strong>010: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A message  A potential denial of service problem has been found in sendmail. A message
 with really long header lines could trigger a use-after-free bug causing  with really long header lines could trigger a use-after-free bug causing
Line 240 
Line 238 
 <p>  <p>
   
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>009: SECURITY FIX: July 30, 2006</strong></font>  <strong>009: SECURITY FIX: July 30, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>'s  <a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>'s
 mod_rewrite has a potentially exploitable off-by-one buffer overflow.  mod_rewrite has a potentially exploitable off-by-one buffer overflow.
Line 254 
Line 252 
 <p>  <p>
   
 <li id="sendmail2">  <li id="sendmail2">
 <font color="#009000"><strong>008: SECURITY FIX: June 15, 2006</strong></font>  <strong>008: SECURITY FIX: June 15, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A malformed MIME  A potential denial of service problem has been found in sendmail. A malformed MIME
 message could trigger excessive recursion which will lead to stack exhaustion.  message could trigger excessive recursion which will lead to stack exhaustion.
Line 268 
Line 266 
 <p>  <p>
   
 <li id="xorg">  <li id="xorg">
 <font color="#009000"><strong>007: SECURITY FIX: May 2, 2006</strong></font>  <strong>007: SECURITY FIX: May 2, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.
Line 280 
Line 278 
 <p>  <p>
   
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>006: SECURITY FIX: March 25, 2006</strong></font>  <strong>006: SECURITY FIX: March 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
 asynchronous signals. A remote attacker may be able to execute arbitrary code with the  asynchronous signals. A remote attacker may be able to execute arbitrary code with the
Line 291 
Line 289 
 <p>  <p>
   
 <li id="ssh">  <li id="ssh">
 <font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font>  <strong>005: SECURITY FIX: February 12, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
 <a href="https://man.openbsd.org/OpenBSD-3.8/system.3">system(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.8/system.3">system(3)</a>
Line 306 
Line 304 
 <p>  <p>
   
 <li id="i386machdep">  <li id="i386machdep">
 <font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font>  <strong>004: RELIABILITY FIX: January 13, 2006</strong>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Constrain  Constrain
 <a href="https://man.openbsd.org/OpenBSD-3.8/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.8/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a>
Line 318 
Line 316 
 <p>  <p>
   
 <li id="i386pmap">  <li id="i386pmap">
 <font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font>  <strong>003: RELIABILITY FIX: January 13, 2006</strong>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Change the implementation of i386 W^X so that the "execute line" can move around.
 Before it was limited to being either at 512MB (below which all code normally  Before it was limited to being either at 512MB (below which all code normally
Line 334 
Line 332 
 <p>  <p>
   
 <li id="fd">  <li id="fd">
 <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font>  <strong>002: SECURITY FIX: January 5, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
 <br>  <br>
Line 343 
Line 341 
 <p>  <p>
   
 <li id="perl">  <li id="perl">
 <font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font>  <strong>001: SECURITY FIX: January 5, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which
 may be exploitable under certain conditions.  may be exploitable under certain conditions.
Line 355 
Line 353 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.70  
changed lines
  Added in v.1.71