version 1.60, 2016/08/15 02:22:06 |
version 1.61, 2016/10/16 19:11:29 |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
<p> |
<p> |
|
|
<font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> |
<font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> |
<i>PowerPC</i><br> |
<i>PowerPC</i><br> |
An unhandled AltiVec assist exception can cause a kernel panic.<br> |
An unhandled AltiVec assist exception can cause a kernel panic.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
IPv6 type 0 route headers can be used to mount a DoS attack against |
IPv6 type 0 route headers can be used to mount a DoS attack against |
hosts and networks. This is a design flaw in IPv6 and not a bug in |
hosts and networks. This is a design flaw in IPv6 and not a bug in |
OpenBSD.<br> |
OpenBSD.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
can be installed.<br> |
can be installed.<br> |
Use "block in inet6" in /etc/pf.conf |
Use "block in inet6" in /etc/pf.conf |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A US daylight saving time rules change takes effect in 2007. |
A US daylight saving time rules change takes effect in 2007. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch"> |
A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br> |
A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br> |
<p> |
<p> |
|
|
|
|
Under some circumstances, processing an ICMP6 echo request would cause |
Under some circumstances, processing an ICMP6 echo request would cause |
the kernel to enter an infinite loop. |
the kernel to enter an infinite loop. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
The <tt>PCIAGP</tt> option is present by default on i386 |
The <tt>PCIAGP</tt> option is present by default on i386 |
kernels only. |
kernels only. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
problem in cases we have not found yet. This patch applies to all ELF-based |
problem in cases we have not found yet. This patch applies to all ELF-based |
systems (m68k, m88k, and vax are a.out-based systems). |
systems (m68k, m88k, and vax are a.out-based systems). |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
privilege escalation. |
privilege escalation. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
style attacks. |
style attacks. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
valid PKCS#1 v1.5 signature. |
valid PKCS#1 v1.5 signature. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
connection causing the kernel to panic. |
connection causing the kernel to panic. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
replay counter. |
replay counter. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
It is possible to cause the kernel to panic when more than the default number of |
It is possible to cause the kernel to panic when more than the default number of |
sempahores have been allocated. |
sempahores have been allocated. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. |
to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a> |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
with really long header lines could trigger a use-after-free bug causing |
with really long header lines could trigger a use-after-free bug causing |
sendmail to crash. |
sendmail to crash. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
could be triggered remotely. The default install is not affected by the |
could be triggered remotely. The default install is not affected by the |
buffer overflow. CVE-2006-3747 |
buffer overflow. CVE-2006-3747 |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
delivered. However, mail messages in the queue may not be reattempted if a |
delivered. However, mail messages in the queue may not be reattempted if a |
malformed MIME message exists. |
malformed MIME message exists. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
Clients authorized to connect to the X server are able to crash it and to execute |
Clients authorized to connect to the X server are able to crash it and to execute |
malicious code within the X server. |
malicious code within the X server. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
privileges of the user running sendmail, typically root. This is the second revision of |
privileges of the user running sendmail, typically root. This is the second revision of |
this patch. |
this patch. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|