[BACK]Return to errata38.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata38.html between version 1.47 and 1.48

version 1.47, 2014/10/02 14:34:45 version 1.48, 2015/02/14 04:36:51
Line 83 
Line 83 
   
 <ul>  <ul>
   
 <li><a name="ssh2"></a>  <li id="ssh2">
 <font color="#009000"><strong>020: SECURITY FIX: October 12, 2006</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: October 12, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found  Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
Line 99 
Line 99 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="systrace"></a>  <li id="systrace">
 <font color="#009000"><strong>019: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
Line 112 
Line 112 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl2"></a>  <li id="openssl2">
 <font color="#009000"><strong>018: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
Line 130 
Line 130 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd2"></a>  <li id="httpd2">
 <font color="#009000"><strong>017: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>
Line 143 
Line 143 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl"></a>  <li id="openssl">
 <font color="#009000"><strong>016: SECURITY FIX: September 8, 2006</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: September 8, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for  Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
Line 155 
Line 155 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="bind"></a>  <li id="bind">
 <font color="#009000"><strong>015: SECURITY FIX: September 8, 2006</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: September 8, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two Denial of Service issues have been found with BIND.  Two Denial of Service issues have been found with BIND.
Line 172 
Line 172 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sppp"></a>  <li id="sppp">
 <font color="#009000"><strong>014: SECURITY FIX: September 2, 2006</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: September 2, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to the failure to correctly validate LCP configuration option lengths,  Due to the failure to correctly validate LCP configuration option lengths,
Line 185 
Line 185 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>013: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem in  A problem in
Line 200 
Line 200 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sem"></a>  <li id="sem">
 <font color="#009000"><strong>012: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
Line 210 
Line 210 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="dhcpd"></a>  <li id="dhcpd">
 <font color="#009000"><strong>011: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to an off-by-one error in  Due to an off-by-one error in
Line 224 
Line 224 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail3"></a>  <li id="sendmail3">
 <font color="#009000"><strong>010: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A message  A potential denial of service problem has been found in sendmail. A message
Line 235 
Line 235 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>009: SECURITY FIX: July 30, 2006</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: July 30, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>'s  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>'s
Line 249 
Line 249 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail2"></a>  <li id="sendmail2">
 <font color="#009000"><strong>008: SECURITY FIX: June 15, 2006</strong></font>  <font color="#009000"><strong>008: SECURITY FIX: June 15, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A malformed MIME  A potential denial of service problem has been found in sendmail. A malformed MIME
Line 263 
Line 263 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="xorg"></a>  <li id="xorg">
 <font color="#009000"><strong>007: SECURITY FIX: May 2, 2006</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: May 2, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
Line 275 
Line 275 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>006: SECURITY FIX: March 25, 2006</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: March 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
Line 286 
Line 286 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ssh"></a>  <li id="ssh">
 <font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
Line 301 
Line 301 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="i386machdep"></a>  <li id="i386machdep">
 <font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Constrain  Constrain
Line 313 
Line 313 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="i386pmap"></a>  <li id="i386pmap">
 <font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Change the implementation of i386 W^X so that the "execute line" can move around.
Line 329 
Line 329 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="fd"></a>  <li id="fd">
 <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
Line 338 
Line 338 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="perl"></a>  <li id="perl">
 <font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which

Legend:
Removed from v.1.47  
changed lines
  Added in v.1.48