[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.69 and 1.70

version 1.69, 2019/04/02 12:46:57 version 1.70, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.9 Errata</title>  <title>OpenBSD 3.9 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata39.html">  <link rel="canonical" href="https://www.openbsd.org/errata39.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.9 Errata</font>  3.9 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="p023_altivec">  <li id="p023_altivec">
 <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font>  <strong>023: STABILITY FIX: April 26, 2007</strong>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">
Line 96 
Line 94 
 <p>  <p>
   
 <li id="p022_route6">  <li id="p022_route6">
 <font color="#009000"><strong>022: SECURITY FIX: April 23, 2007</strong></font>  <strong>022: SECURITY FIX: April 23, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
Line 106 
Line 104 
 <p>  <p>
   
 <li id="p021_xorg">  <li id="p021_xorg">
 <font color="#009000"><strong>021: SECURITY FIX: April 4, 2007</strong></font>  <strong>021: SECURITY FIX: April 4, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,  XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,
Line 124 
Line 122 
 <p>  <p>
   
 <li id="m_dup1">  <li id="m_dup1">
 <font color="#009000"><strong>020: SECURITY FIX: March 7, 2007</strong></font>  <strong>020: SECURITY FIX: March 7, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, March 17, 2007</strong><br>  <b>2nd revision, March 17, 2007</b><br>
 Incorrect mbuf handling for ICMP6 packets.<br>  Incorrect mbuf handling for ICMP6 packets.<br>
 Using  Using
 <a href="https://man.openbsd.org/OpenBSD-3.9/pf.4">pf(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.9/pf.4">pf(4)</a>
Line 139 
Line 137 
 <p>  <p>
   
 <li id="timezone">  <li id="timezone">
 <font color="#009000"><strong>019: INTEROPERABILITY FIX: February 4, 2007</strong></font>  <strong>019: INTEROPERABILITY FIX: February 4, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
 <br>  <br>
Line 148 
Line 146 
 <p>  <p>
   
 <li id="icmp6">  <li id="icmp6">
 <font color="#009000"><strong>018: RELIABILITY FIX: January 16, 2007</strong></font>  <strong>018: RELIABILITY FIX: January 16, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
Line 158 
Line 156 
 <p>  <p>
   
 <li id="agp">  <li id="agp">
 <font color="#009000"><strong>017: SECURITY FIX: January 3, 2007</strong></font>  <strong>017: SECURITY FIX: January 3, 2007</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 Insufficient validation in  Insufficient validation in
 <a href="https://man.openbsd.org/OpenBSD-3.9/vga.4">vga(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.9/vga.4">vga(4)</a>
 may allow an attacker to gain root privileges if the kernel is compiled with  may allow an attacker to gain root privileges if the kernel is compiled with
 <tt>option PCIAGP</tt>  <code>option PCIAGP</code>
 and the actual device is not an AGP device.  and the actual device is not an AGP device.
 The <tt>PCIAGP</tt> option is present by default on i386  The <code>PCIAGP</code> option is present by default on i386
 kernels only.  kernels only.
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">
Line 173 
Line 171 
 <p>  <p>
   
 <li id="ldso">  <li id="ldso">
 <font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font>  <strong>016: SECURITY FIX: November 19, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The ELF  The ELF
 <a href="https://man.openbsd.org/OpenBSD-3.9/ld.so.1">ld.so(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.9/ld.so.1">ld.so(1)</a>
Line 186 
Line 184 
 <p>  <p>
   
 <li id="ssh">  <li id="ssh">
 <font color="#009000"><strong>015: SECURITY FIX: October 12, 2006</strong></font>  <strong>015: SECURITY FIX: October 12, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found  Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
 by Tavis Ormandy) that would cause  by Tavis Ormandy) that would cause
Line 202 
Line 200 
 <p>  <p>
   
 <li id="systrace">  <li id="systrace">
 <font color="#009000"><strong>014: SECURITY FIX: October 7, 2006</strong></font>  <strong>014: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
 <a href="https://man.openbsd.org/OpenBSD-3.9/systrace.4">systrace(4)</a>'s  <a href="https://man.openbsd.org/OpenBSD-3.9/systrace.4">systrace(4)</a>'s
Line 215 
Line 213 
 <p>  <p>
   
 <li id="openssl2">  <li id="openssl2">
 <font color="#009000"><strong>013: SECURITY FIX: October 7, 2006</strong></font>  <strong>013: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
 structures an error condition is mishandled, possibly resulting in an infinite  structures an error condition is mishandled, possibly resulting in an infinite
Line 233 
Line 231 
 <p>  <p>
   
 <li id="httpd2">  <li id="httpd2">
 <font color="#009000"><strong>012: SECURITY FIX: October 7, 2006</strong></font>  <strong>012: SECURITY FIX: October 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.9/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.9/httpd.8">httpd(8)</a>
 does not sanitize the Expect header from an HTTP request when it is  does not sanitize the Expect header from an HTTP request when it is
Line 246 
Line 244 
 <p>  <p>
   
 <li id="openssl">  <li id="openssl">
 <font color="#009000"><strong>011: SECURITY FIX: September 8, 2006</strong></font>  <strong>011: SECURITY FIX: September 8, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for  Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
 an attacker to construct an invalid signature which OpenSSL would accept as a  an attacker to construct an invalid signature which OpenSSL would accept as a
Line 258 
Line 256 
 <p>  <p>
   
 <li id="bind">  <li id="bind">
 <font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font>  <strong>010: SECURITY FIX: September 8, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two Denial of Service issues have been found with BIND.  Two Denial of Service issues have been found with BIND.
 An attacker who can perform recursive lookups on a DNS server and is able  An attacker who can perform recursive lookups on a DNS server and is able
Line 275 
Line 273 
 <p>  <p>
   
 <li id="sppp">  <li id="sppp">
 <font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font>  <strong>009: SECURITY FIX: September 2, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to the failure to correctly validate LCP configuration option lengths,  Due to the failure to correctly validate LCP configuration option lengths,
 it is possible for an attacker to send LCP packets via an  it is possible for an attacker to send LCP packets via an
Line 288 
Line 286 
 <p>  <p>
   
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font>  <strong>008: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem in  A problem in
 <a href="https://man.openbsd.org/OpenBSD-3.9/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.9/isakmpd.8">isakmpd(8)</a>
Line 303 
Line 301 
 <p>  <p>
   
 <li id="sem">  <li id="sem">
 <font color="#009000"><strong>007: SECURITY FIX: August 25, 2006</strong></font>  <strong>007: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
 sempahores have been allocated.  sempahores have been allocated.
Line 313 
Line 311 
 <p>  <p>
   
 <li id="dhcpd">  <li id="dhcpd">
 <font color="#009000"><strong>006: SECURITY FIX: August 25, 2006</strong></font>  <strong>006: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to an off-by-one error in  Due to an off-by-one error in
 <a href="https://man.openbsd.org/OpenBSD-3.9/dhcpd.8">dhcpd(8)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.9/dhcpd.8">dhcpd(8)</a>,
Line 327 
Line 325 
 <p>  <p>
   
 <li id="sendmail3">  <li id="sendmail3">
 <font color="#009000"><strong>005: SECURITY FIX: August 25, 2006</strong></font>  <strong>005: SECURITY FIX: August 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A message  A potential denial of service problem has been found in sendmail. A message
 with really long header lines could trigger a use-after-free bug causing  with really long header lines could trigger a use-after-free bug causing
Line 338 
Line 336 
 <p>  <p>
   
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>004: SECURITY FIX: July 30, 2006</strong></font>  <strong>004: SECURITY FIX: July 30, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.9/httpd.8">httpd(8)</a>'s  <a href="https://man.openbsd.org/OpenBSD-3.9/httpd.8">httpd(8)</a>'s
 mod_rewrite has a potentially exploitable off-by-one buffer overflow.  mod_rewrite has a potentially exploitable off-by-one buffer overflow.
Line 352 
Line 350 
 <p>  <p>
   
 <li id="sendmail2">  <li id="sendmail2">
 <font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font>  <strong>003: SECURITY FIX: June 15, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A malformed MIME  A potential denial of service problem has been found in sendmail. A malformed MIME
 message could trigger excessive recursion which will lead to stack exhaustion.  message could trigger excessive recursion which will lead to stack exhaustion.
Line 366 
Line 364 
 <p>  <p>
   
 <li id="xorg">  <li id="xorg">
 <font color="#009000"><strong>002: SECURITY FIX: May 2, 2006</strong></font>  <strong>002: SECURITY FIX: May 2, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>.
Line 378 
Line 376 
 <p>  <p>
   
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>001: SECURITY FIX: March 25, 2006</strong></font>  <strong>001: SECURITY FIX: March 25, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
 asynchronous signals. A remote attacker may be able to execute arbitrary code with the  asynchronous signals. A remote attacker may be able to execute arbitrary code with the
Line 392 
Line 390 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.69  
changed lines
  Added in v.1.70