[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.60 and 1.61

version 1.60, 2016/08/15 02:22:06 version 1.61, 2016/10/16 19:11:29
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 91 
Line 91 
 <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font>  <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 101 
Line 101 
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 119 
Line 119 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 134 
Line 134 
 can be installed.<br>  can be installed.<br>
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 143 
Line 143 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch">
 A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>  A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>
 <p>  <p>
   
Line 153 
Line 153 
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 168 
Line 168 
 The <tt>PCIAGP</tt> option is present by default on i386  The <tt>PCIAGP</tt> option is present by default on i386
 kernels only.  kernels only.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 181 
Line 181 
 problem in cases we have not found yet.  This patch applies to all ELF-based  problem in cases we have not found yet.  This patch applies to all ELF-based
 systems (m68k, m88k, and vax are a.out-based systems).  systems (m68k, m88k, and vax are a.out-based systems).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 197 
Line 197 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 210 
Line 210 
 Chris Evans. This could be exploited for DoS, limited kmem reads or local  Chris Evans. This could be exploited for DoS, limited kmem reads or local
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 228 
Line 228 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 241 
Line 241 
 style attacks.  style attacks.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 253 
Line 253 
 valid PKCS#1 v1.5 signature.  valid PKCS#1 v1.5 signature.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 270 
Line 270 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 283 
Line 283 
 connection causing the kernel to panic.  connection causing the kernel to panic.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 298 
Line 298 
 An attacker could reinject sniffed IPsec packets, which will be accepted without checking the  An attacker could reinject sniffed IPsec packets, which will be accepted without checking the
 replay counter.  replay counter.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 308 
Line 308 
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
 sempahores have been allocated.  sempahores have been allocated.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 322 
Line 322 
 to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.  to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 333 
Line 333 
 with really long header lines could trigger a use-after-free bug causing  with really long header lines could trigger a use-after-free bug causing
 sendmail to crash.  sendmail to crash.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 347 
Line 347 
 could be triggered remotely. The default install is not affected by the  could be triggered remotely. The default install is not affected by the
 buffer overflow. CVE-2006-3747  buffer overflow. CVE-2006-3747
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 361 
Line 361 
 delivered. However, mail messages in the queue may not be reattempted if a  delivered. However, mail messages in the queue may not be reattempted if a
 malformed MIME message exists.  malformed MIME message exists.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 373 
Line 373 
 Clients authorized to connect to the X server are able to crash it and to execute  Clients authorized to connect to the X server are able to crash it and to execute
 malicious code within the X server.  malicious code within the X server.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 385 
Line 385 
 privileges of the user running sendmail, typically root. This is the second revision of  privileges of the user running sendmail, typically root. This is the second revision of
 this patch.  this patch.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.60  
changed lines
  Added in v.1.61