[BACK]Return to errata40.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata40.html between version 1.40 and 1.41

version 1.40, 2014/03/28 03:04:30 version 1.41, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2007 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_4_0</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_4_0</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <!-- Temporarily put anchors for all archs here.  Remove later. -->  
 <a name="all"></a>  
 <a name="alpha"></a>  
 <a name="amd64"></a>  
 <a name="armish"></a>  
 <a name="cats"></a>  
 <a name="hp300"></a>  
 <a name="hppa"></a>  
 <a name="i386"></a>  
 <a name="luna88k"></a>  
 <a name="mac68k"></a>  
 <a name="macppc"></a>  
 <a name="mvme68k"></a>  
 <a name="mvme88k"></a>  
 <a name="sgi"></a>  
 <a name="sparc"></a>  
 <a name="sparc64"></a>  
 <a name="vax"></a>  
 <a name="zaurus"></a>  
 <ul>  <ul>
   
 <li><a name="017_openssl"></a>  <li><a name="017_openssl"></a>
Line 100 
Line 83 
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/017_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/017_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="016_dhcpd"></a>  <li><a name="016_dhcpd"></a>
Line 110 
Line 93 
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/016_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/016_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="015_file"></a>  <li><a name="015_file"></a>
 <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="014_xorg"></a>  <li><a name="014_xorg"></a>
 <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_altivec"></a>  <li><a name="013_altivec"></a>
 <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>  <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font> &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_route6"></a>  <li><a name="012_route6"></a>
Line 140 
Line 123 
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/012_route6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/012_route6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="011_xorg"></a>  <li><a name="011_xorg"></a>
Line 157 
Line 140 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/011_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/011_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="m_dup1"></a>  <li><a name="m_dup1"></a>
Line 171 
Line 154 
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/010_m_dup1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/010_m_dup1.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="timezone"></a>  <li><a name="timezone"></a>
Line 188 
Line 171 
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/008_icmp6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/008_icmp6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="agp"></a>  <li><a name="agp"></a>
Line 203 
Line 186 
 kernels only.  kernels only.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ports-tar"></a>  <li><a name="ports-tar"></a>
Line 230 
Line 213 
 systems (m68k, m88k, and vax are a.out-based systems).  systems (m68k, m88k, and vax are a.out-based systems).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/005_ldso.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/005_ldso.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="arc"></a>  <li><a name="arc"></a>
Line 243 
Line 226 
 boot up.  boot up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/004_arc.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/004_arc.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="systrace"></a>  <li><a name="systrace"></a>
Line 255 
Line 238 
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/003_systrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/003_systrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl2"></a>  <li><a name="openssl2"></a>
Line 273 
Line 256 
 <br>  <br>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/002_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/002_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
Line 286 
Line 269 
   
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/001_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/001_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 </ul>  </ul>

Legend:
Removed from v.1.40  
changed lines
  Added in v.1.41