[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.46 and 1.47

version 1.46, 2014/10/02 14:34:45 version 1.47, 2015/02/14 04:36:51
Line 83 
Line 83 
   
 <ul>  <ul>
   
 <li><a name="023_altivec"></a>  <li id="023_altivec">
 <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font>  <font color="#009000"><strong>023: STABILITY FIX: April 26, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
Line 91 
Line 91 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="022_route6"></a>  <li id="022_route6">
 <font color="#009000"><strong>022: SECURITY FIX: April 23, 2007</strong></font>  <font color="#009000"><strong>022: SECURITY FIX: April 23, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
Line 101 
Line 101 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="021_xorg"></a>  <li id="021_xorg">
 <font color="#009000"><strong>021: SECURITY FIX: April 4, 2007</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: April 4, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
Line 119 
Line 119 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="m_dup1"></a>  <li id="m_dup1">
 <font color="#009000"><strong>020: SECURITY FIX: March 7, 2007</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: March 7, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, March 17, 2007</strong><br>  <strong>2nd revision, March 17, 2007</strong><br>
Line 134 
Line 134 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="timezone"></a>  <li id="timezone">
 <font color="#009000"><strong>019: INTEROPERABILITY FIX: February 4, 2007</strong></font>  <font color="#009000"><strong>019: INTEROPERABILITY FIX: February 4, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
Line 143 
Line 143 
 A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>  A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>
 <p>  <p>
   
 <li><a name="icmp6"></a>  <li id="icmp6">
 <font color="#009000"><strong>018: RELIABILITY FIX: January 16, 2007</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: January 16, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
Line 153 
Line 153 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="agp"></a>  <li id="agp">
 <font color="#009000"><strong>017: SECURITY FIX: January 3, 2007</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: January 3, 2007</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 Insufficient validation in  Insufficient validation in
Line 168 
Line 168 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ldso"></a>  <li id="ldso">
 <font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The ELF  The ELF
Line 181 
Line 181 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ssh"></a>  <li id="ssh">
 <font color="#009000"><strong>015: SECURITY FIX: October 12, 2006</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: October 12, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found  Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
Line 197 
Line 197 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="systrace"></a>  <li id="systrace">
 <font color="#009000"><strong>014: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
Line 210 
Line 210 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl2"></a>  <li id="openssl2">
 <font color="#009000"><strong>013: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
Line 228 
Line 228 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd2"></a>  <li id="httpd2">
 <font color="#009000"><strong>012: SECURITY FIX: October 7, 2006</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: October 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>
Line 241 
Line 241 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl"></a>  <li id="openssl">
 <font color="#009000"><strong>011: SECURITY FIX: September 8, 2006</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: September 8, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for  Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
Line 253 
Line 253 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="bind"></a>  <li id="bind">
 <font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two Denial of Service issues have been found with BIND.  Two Denial of Service issues have been found with BIND.
Line 270 
Line 270 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sppp"></a>  <li id="sppp">
 <font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to the failure to correctly validate LCP configuration option lengths,  Due to the failure to correctly validate LCP configuration option lengths,
Line 283 
Line 283 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>008: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A problem in  A problem in
Line 298 
Line 298 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sem"></a>  <li id="sem">
 <font color="#009000"><strong>007: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to cause the kernel to panic when more than the default number of  It is possible to cause the kernel to panic when more than the default number of
Line 308 
Line 308 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="dhcpd"></a>  <li id="dhcpd">
 <font color="#009000"><strong>006: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to an off-by-one error in  Due to an off-by-one error in
Line 322 
Line 322 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail3"></a>  <li id="sendmail3">
 <font color="#009000"><strong>005: SECURITY FIX: August 25, 2006</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: August 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A message  A potential denial of service problem has been found in sendmail. A message
Line 333 
Line 333 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>004: SECURITY FIX: July 30, 2006</strong></font>  <font color="#009000"><strong>004: SECURITY FIX: July 30, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>'s  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>'s
Line 347 
Line 347 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail2"></a>  <li id="sendmail2">
 <font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential denial of service problem has been found in sendmail. A malformed MIME  A potential denial of service problem has been found in sendmail. A malformed MIME
Line 361 
Line 361 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="xorg"></a>  <li id="xorg">
 <font color="#009000"><strong>002: SECURITY FIX: May 2, 2006</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: May 2, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
Line 373 
Line 373 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>001: SECURITY FIX: March 25, 2006</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: March 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of

Legend:
Removed from v.1.46  
changed lines
  Added in v.1.47