[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.30 and 1.31

version 1.30, 2010/03/08 21:53:37 version 1.31, 2010/07/08 19:00:07
Line 54 
Line 54 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 89 
Line 89 
 <li><a name="023_altivec"></a>  <li><a name="023_altivec"></a>
 <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>  <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 98 
Line 98 
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 115 
Line 115 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 129 
Line 129 
 can be installed.<br>  can be installed.<br>
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 137 
Line 137 
 <font color="#009000"><strong>019: INTEROPERABILITY FIX: February 4, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>019: INTEROPERABILITY FIX: February 4, 2007</strong></font> &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/019_timezone.patch">
 A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>  A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>
 <p>  <p>
   
Line 146 
Line 146 
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 161 
Line 161 
 The <tt>PCIAGP</tt> option is present by default on i386  The <tt>PCIAGP</tt> option is present by default on i386
 kernels only.  kernels only.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 173 
Line 173 
 problem in cases we have not found yet.  This patch applies to all ELF-based  problem in cases we have not found yet.  This patch applies to all ELF-based
 systems (m68k, m88k, and vax are a.out-based systems).  systems (m68k, m88k, and vax are a.out-based systems).
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 188 
Line 188 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 200 
Line 200 
 Chris Evans. This could be exploited for DoS, limited kmem reads or local  Chris Evans. This could be exploited for DoS, limited kmem reads or local
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 217 
Line 217 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 229 
Line 229 
 style attacks.  style attacks.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 240 
Line 240 
 valid PKCS#1 v1.5 signature.  valid PKCS#1 v1.5 signature.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 256 
Line 256 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a>
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 268 
Line 268 
 connection causing the kernel to panic.  connection causing the kernel to panic.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 282 
Line 282 
 An attacker could reinject sniffed IPsec packets, which will be accepted without checking the  An attacker could reinject sniffed IPsec packets, which will be accepted without checking the
 replay counter.  replay counter.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 291 
Line 291 
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
 sempahores have been allocated.  sempahores have been allocated.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 304 
Line 304 
 to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.  to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 314 
Line 314 
 with really long header lines could trigger a use-after-free bug causing  with really long header lines could trigger a use-after-free bug causing
 sendmail to crash.  sendmail to crash.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 327 
Line 327 
 could be triggered remotely. The default install is not affected by the  could be triggered remotely. The default install is not affected by the
 buffer overflow. CVE-2006-3747  buffer overflow. CVE-2006-3747
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 340 
Line 340 
 delivered. However, mail messages in the queue may not be reattempted if a  delivered. However, mail messages in the queue may not be reattempted if a
 malformed MIME message exists.  malformed MIME message exists.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 351 
Line 351 
 Clients authorized to connect to the X server are able to crash it and to execute  Clients authorized to connect to the X server are able to crash it and to execute
 malicious code within the X server.  malicious code within the X server.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 362 
Line 362 
 privileges of the user running sendmail, typically root. This is the second revision of  privileges of the user running sendmail, typically root. This is the second revision of
 this patch.  this patch.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 </ul>  </ul>

Legend:
Removed from v.1.30  
changed lines
  Added in v.1.31