[BACK]Return to errata40.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata40.html between version 1.58 and 1.59

version 1.58, 2016/08/15 02:22:06 version 1.59, 2016/10/16 19:11:29
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 92 
Line 92 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/017_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/017_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 103 
Line 103 
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/016_dhcpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/016_dhcpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 111 
Line 111 
 <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 119 
Line 119 
 <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font>  <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 127 
Line 127 
 <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font>  <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 137 
Line 137 
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/012_route6.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/012_route6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 155 
Line 155 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/011_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/011_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 170 
Line 170 
 can be installed.<br>  can be installed.<br>
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/010_m_dup1.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/010_m_dup1.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 179 
Line 179 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/009_timezone.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/009_timezone.patch">
 A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>  A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>
 <p>  <p>
   
Line 189 
Line 189 
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/008_icmp6.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/008_icmp6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 204 
Line 204 
 The <tt>PCIAGP</tt> option is present by default on i386  The <tt>PCIAGP</tt> option is present by default on i386
 kernels only.  kernels only.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 217 
Line 217 
 them from a <a href="ftp.html">mirror</a>.  them from a <a href="ftp.html">mirror</a>.
 <br>  <br>
 The archives have been corrected. The correct MD5 of  The archives have been corrected. The correct MD5 of
 <a href="http://ftp.openbsd.org/pub/OpenBSD/4.0/ports.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/4.0/ports.tar.gz">
 ports.tar.gz</a> is eff352b4382a7fb7ffce1e8b37e9eb56, and for  ports.tar.gz</a> is eff352b4382a7fb7ffce1e8b37e9eb56, and for
 <a href="http://ftp.openbsd.org/pub/OpenBSD/4.0/src.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/4.0/src.tar.gz">
 src.tar.gz</a> it is b8d7a0dc6f3d27a5377a23d69c40688e.  src.tar.gz</a> it is b8d7a0dc6f3d27a5377a23d69c40688e.
 <br>  <br>
 <p>  <p>
Line 233 
Line 233 
 problem in cases we have not found yet.  This patch applies to all ELF-based  problem in cases we have not found yet.  This patch applies to all ELF-based
 systems (m68k, m88k, and vax are a.out-based systems).  systems (m68k, m88k, and vax are a.out-based systems).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/005_ldso.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/005_ldso.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 247 
Line 247 
 volumes will not be properly marked as being clean and fsck will be run for the subsequent  volumes will not be properly marked as being clean and fsck will be run for the subsequent
 boot up.  boot up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/004_arc.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/004_arc.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 260 
Line 260 
 Chris Evans. This could be exploited for DoS, limited kmem reads or local  Chris Evans. This could be exploited for DoS, limited kmem reads or local
 privilege escalation.  privilege escalation.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/003_systrace.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/003_systrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 279 
Line 279 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
 <br>  <br>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/002_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/002_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 293 
Line 293 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
   
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/001_httpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/001_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.58  
changed lines
  Added in v.1.59