[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.2 and 1.3

version 1.2, 2006/03/08 19:53:56 version 1.3, 2006/10/30 20:59:45
Line 42 
Line 42 
 <a href="errata36.html">3.6</a>,  <a href="errata36.html">3.6</a>,
 <a href="errata37.html">3.7</a>,  <a href="errata37.html">3.7</a>,
 <a href="errata38.html">3.8</a>,  <a href="errata38.html">3.8</a>,
 <a href="errata.html">current</a>.  <a href="errata.html">4.0</a>.
 <br>  <br>
 <hr>  <hr>
   
Line 51 
Line 51 
 This file is updated once a day.  This file is updated once a day.
   
 <p> The patches below are available in CVS via the  <p> The patches below are available in CVS via the
 <code>OPENBSD_3_8</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_3_9</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
Line 66 
Line 66 
 <a name="hp300"></a>  <a name="hp300"></a>
 <a name="hppa"></a>  <a name="hppa"></a>
 <a name="i386"></a>  <a name="i386"></a>
 <a name="mvme88k"></a>  
 <a name="mac68k"></a>  <a name="mac68k"></a>
 <a name="macppc"></a>  <a name="macppc"></a>
 <a name="mvme68k"></a>  <a name="mvme68k"></a>
Line 77 
Line 76 
 <ul>  <ul>
   
 <li><a name="ssh"></a>  <li><a name="ssh"></a>
 <font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>015: SECURITY FIX: October 12, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=system&amp;sektion=3">system(3)</a>  by Tavis Ormandy) that would cause
 function in  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>  to spin until the login grace time expired.
 when performing copy operations using filenames that are supplied by the user from the command line.  An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition
 This can be exploited to execute shell commands with privileges of the user running  that could be exploited to perform a pre-authentication denial of service.
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=scp&amp;sektion=1">scp(1)</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
 <li><a name="i386machdep"></a>  <li><a name="systrace"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font> &nbsp; <i>i386 architecture</i><br>  <font color="#009000"><strong>014: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 Constrain  Fix for an integer overflow in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=i386_set_ioperm&amp;arch=i386&amp;sektion=2">i386_set_ioperm(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&amp;sektion=4">systrace(4)</a>'s
 so even root is blocked from accessing the ioports  STRIOCREPLACE support, found by
 unless the machine is running at lower securelevels or with an open X11 aperture.  Chris Evans. This could be exploited for DoS, limited kmem reads or local
   privilege escalation.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
 <li><a name="i386pmap"></a>  <li><a name="openssl2"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font> &nbsp; <i>i386 architecture</i><br>  <font color="#009000"><strong>013: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
 Before it was limited to being either at 512MB (below which all code normally  structures an error condition is mishandled, possibly resulting in an infinite
 lands) or at the top of the stack. Now the line can float as  loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mprotect&amp;sektion=2">mprotect(2)</a>  pointer may be dereferenced in the SSL version 2 client code. In addition, many
 and  applications using OpenSSL do not perform any validation of the lengths of
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mmap&amp;sektion=2">mmap(2)</a>  public keys being used.
 requests need it to. This is now implemented using only GDT selectors  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</a>,
 instead of the LDT so that it is more robust as well.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
 <li><a name="fd"></a>  <li><a name="httpd2"></a>
 <font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>012: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>
   does not sanitize the Expect header from an HTTP request when it is
   reflected back in an error message, which might allow cross-site scripting (XSS)
   style attacks.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
 <li><a name="perl"></a>  <li><a name="openssl"></a>
 <font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: SECURITY FIX: September 8, 2006</strong></font> &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
 may be exploitable under certain conditions.  an attacker to construct an invalid signature which OpenSSL would accept as a
   valid PKCS#1 v1.5 signature.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
   <li><a name="bind"></a>
   <font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   Two Denial of Service issues have been found with BIND.
   An attacker who can perform recursive lookups on a DNS server and is able
   to send a sufficiently large number of recursive queries, or is able to
   get the DNS server to return more than one SIG(covered) RRsets can stop
   the functionality of the DNS service.
   An attacker querying an authoritative DNS server serving a RFC 2535
   DNSSEC zone may be able to crash the DNS server.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="sppp"></a>
   <font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   Due to the failure to correctly validate LCP configuration option lengths,
   it is possible for an attacker to send LCP packets via an
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sppp&amp;sektion=4">sppp(4)</a>
   connection causing the kernel to panic.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="isakmpd"></a>
   <font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   A problem in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;sektion=8">isakmpd(8)</a>
   caused IPsec to run partly without replay protection. If
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;sektion=8">isakmpd(8)</a>
   was acting as responder during SA negotiation, SA's with a replay window of size 0 were created.
   An attacker could reinject sniffed IPsec packets, which will be accepted without checking the
   replay counter.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="sem"></a>
   <font color="#009000"><strong>007: SECURITY FIX: August 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   It is possible to cause the kernel to panic when more than the default number of
   sempahores have been allocated.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="dhcpd"></a>
   <font color="#009000"><strong>006: SECURITY FIX: August 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   Due to an off-by-one error in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dhcpd&amp;sektion=8">dhcpd(8)</a>,
   it is possible to cause
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dhcpd&amp;sektion=8">dhcpd(8)</a>
   to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="sendmail3"></a>
   <font color="#009000"><strong>005: SECURITY FIX: August 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   A potential denial of service problem has been found in sendmail. A message
   with really long header lines could trigger a use-after-free bug causing
   sendmail to crash.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="httpd"></a>
   <font color="#009000"><strong>004: SECURITY FIX: July 30, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>'s
   mod_rewrite has a potentially exploitable off-by-one buffer overflow.
   The buffer overflow may result in a vulnerability which, in combination
   with certain types of Rewrite rules in the web server configuration files,
   could be triggered remotely. The default install is not affected by the
   buffer overflow. CVE-2006-3747
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="sendmail2"></a>
   <font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   A potential denial of service problem has been found in sendmail. A malformed MIME
   message could trigger excessive recursion which will lead to stack exhaustion.
   This denial of service attack only affects delivery of mail from the queue and
   delivery of a malformed message. Other incoming mail is still accepted and
   delivered. However, mail messages in the queue may not be reattempted if a
   malformed MIME message exists.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="xorg"></a>
   <font color="#009000"><strong>002: SECURITY FIX: May 2, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   A security vulnerability has been found in the X.Org server --
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.
   Clients authorized to connect to the X server are able to crash it and to execute
   malicious code within the X server.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="sendmail"></a>
   <font color="#009000"><strong>001: SECURITY FIX: March 25, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   A race condition has been reported to exist in the handling by sendmail of
   asynchronous signals. A remote attacker may be able to execute arbitrary code with the
   privileges of the user running sendmail, typically root. This is the second revision of
   this patch.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
 </ul>  </ul>
   
 <br>  <br>
Line 159 
Line 290 
 <a href="errata36.html">3.6</a>,  <a href="errata36.html">3.6</a>,
 <a href="errata37.html">3.7</a>,  <a href="errata37.html">3.7</a>,
 <a href="errata38.html">3.8</a>,  <a href="errata38.html">3.8</a>,
 <a href="errata.html">current</a>.  <a href="errata.html">4.0</a>.
 <br>  <br>
   
 <hr>  <hr>

Legend:
Removed from v.1.2  
changed lines
  Added in v.1.3