[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.42 and 1.43

version 1.42, 2014/03/28 03:04:30 version 1.43, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2007 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_3_9</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_3_9</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <!-- Temporarily put anchors for all archs here.  Remove later. -->  
 <a name="all"></a>  
 <a name="alpha"></a>  
 <a name="amd64"></a>  
 <a name="cats"></a>  
 <a name="hp300"></a>  
 <a name="hppa"></a>  
 <a name="i386"></a>  
 <a name="luna88k"></a>  
 <a name="mac68k"></a>  
 <a name="macppc"></a>  
 <a name="mvme68k"></a>  
 <a name="mvme88k"></a>  
 <a name="sgi"></a>  
 <a name="sparc"></a>  
 <a name="sparc64"></a>  
 <a name="vax"></a>  
 <a name="zaurus"></a>  
 <ul>  <ul>
   
 <li><a name="023_altivec"></a>  <li><a name="023_altivec"></a>
 <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>  <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/macppc/023_altivec.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="022_route6"></a>  <li><a name="022_route6"></a>
Line 107 
Line 91 
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/022_route6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="021_xorg"></a>  <li><a name="021_xorg"></a>
Line 124 
Line 108 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="m_dup1"></a>  <li><a name="m_dup1"></a>
Line 138 
Line 122 
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/020_m_dup1.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="timezone"></a>  <li><a name="timezone"></a>
Line 155 
Line 139 
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/018_icmp6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="agp"></a>  <li><a name="agp"></a>
Line 170 
Line 154 
 kernels only.  kernels only.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ldso"></a>  <li><a name="ldso"></a>
Line 182 
Line 166 
 systems (m68k, m88k, and vax are a.out-based systems).  systems (m68k, m88k, and vax are a.out-based systems).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/016_ldso.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ssh"></a>  <li><a name="ssh"></a>
Line 197 
Line 181 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/015_ssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="systrace"></a>  <li><a name="systrace"></a>
Line 209 
Line 193 
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/014_systrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl2"></a>  <li><a name="openssl2"></a>
Line 226 
Line 210 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/013_openssl2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd2"></a>  <li><a name="httpd2"></a>
Line 238 
Line 222 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/012_httpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl"></a>  <li><a name="openssl"></a>
Line 249 
Line 233 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="bind"></a>  <li><a name="bind"></a>
Line 265 
Line 249 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sppp"></a>  <li><a name="sppp"></a>
Line 277 
Line 261 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/009_sppp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
Line 291 
Line 275 
 replay counter.  replay counter.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/008_isakmpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sem"></a>  <li><a name="sem"></a>
Line 300 
Line 284 
 sempahores have been allocated.  sempahores have been allocated.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/007_sem.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="dhcpd"></a>  <li><a name="dhcpd"></a>
Line 313 
Line 297 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122">CVE-2006-3122</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/006_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail3"></a>  <li><a name="sendmail3"></a>
Line 323 
Line 307 
 sendmail to crash.  sendmail to crash.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/005_sendmail3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
Line 336 
Line 320 
 buffer overflow. CVE-2006-3747  buffer overflow. CVE-2006-3747
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail2"></a>  <li><a name="sendmail2"></a>
Line 349 
Line 333 
 malformed MIME message exists.  malformed MIME message exists.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="xorg"></a>  <li><a name="xorg"></a>
Line 360 
Line 344 
 malicious code within the X server.  malicious code within the X server.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/002_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
Line 371 
Line 355 
 this patch.  this patch.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/001_sendmail.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 </ul>  </ul>

Legend:
Removed from v.1.42  
changed lines
  Added in v.1.43