[BACK]Return to errata40.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata40.html between version 1.67 and 1.68

version 1.67, 2019/04/02 12:46:57 version 1.68, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 4.0 Errata</title>  <title>OpenBSD 4.0 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata40.html">  <link rel="canonical" href="https://www.openbsd.org/errata40.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">4.0 Errata</font>  4.0 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="p017_openssl">  <li id="p017_openssl">
 <font color="#009000"><strong>017: SECURITY FIX: October 10, 2007</strong></font>  <strong>017: SECURITY FIX: October 10, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
Line 97 
Line 95 
 <p>  <p>
   
 <li id="p016_dhcpd">  <li id="p016_dhcpd">
 <font color="#009000"><strong>016: SECURITY FIX: October 8, 2007</strong></font>  <strong>016: SECURITY FIX: October 8, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
Line 108 
Line 106 
 <p>  <p>
   
 <li id="p015_file">  <li id="p015_file">
 <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font>  <strong>015: SECURITY FIX: July 9, 2007</strong>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/015_file.patch">
Line 116 
Line 114 
 <p>  <p>
   
 <li id="p014_xorg">  <li id="p014_xorg">
 <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font>  <strong>014: STABILITY FIX: May 9, 2007</strong>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/014_xorg.patch">
Line 124 
Line 122 
 <p>  <p>
   
 <li id="p013_altivec">  <li id="p013_altivec">
 <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font>  <strong>013: STABILITY FIX: April 26, 2007</strong>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/macppc/013_altivec.patch">
Line 132 
Line 130 
 <p>  <p>
   
 <li id="p012_route6">  <li id="p012_route6">
 <font color="#009000"><strong>012: SECURITY FIX: April 23, 2007</strong></font>  <strong>012: SECURITY FIX: April 23, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
Line 142 
Line 140 
 <p>  <p>
   
 <li id="p011_xorg">  <li id="p011_xorg">
 <font color="#009000"><strong>011: SECURITY FIX: April 4, 2007</strong></font>  <strong>011: SECURITY FIX: April 4, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,  XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,
Line 160 
Line 158 
 <p>  <p>
   
 <li id="m_dup1">  <li id="m_dup1">
 <font color="#009000"><strong>010: SECURITY FIX: March 7, 2007</strong></font>  <strong>010: SECURITY FIX: March 7, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, March 17, 2007</strong><br>  <b>2nd revision, March 17, 2007</b><br>
 Incorrect mbuf handling for ICMP6 packets.<br>  Incorrect mbuf handling for ICMP6 packets.<br>
 Using  Using
 <a href="https://man.openbsd.org/OpenBSD-4.0/pf.4">pf(4)</a>  <a href="https://man.openbsd.org/OpenBSD-4.0/pf.4">pf(4)</a>
Line 175 
Line 173 
 <p>  <p>
   
 <li id="timezone">  <li id="timezone">
 <font color="#009000"><strong>009: INTEROPERABILITY FIX: February 4, 2007</strong></font>  <strong>009: INTEROPERABILITY FIX: February 4, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
 <br>  <br>
Line 184 
Line 182 
 <p>  <p>
   
 <li id="icmp6">  <li id="icmp6">
 <font color="#009000"><strong>008: RELIABILITY FIX: January 16, 2007</strong></font>  <strong>008: RELIABILITY FIX: January 16, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
 the kernel to enter an infinite loop.  the kernel to enter an infinite loop.
Line 194 
Line 192 
 <p>  <p>
   
 <li id="agp">  <li id="agp">
 <font color="#009000"><strong>007: SECURITY FIX: January 3, 2007</strong></font>  <strong>007: SECURITY FIX: January 3, 2007</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 Insufficient validation in  Insufficient validation in
 <a href="https://man.openbsd.org/OpenBSD-4.0/vga.4">vga(4)</a>  <a href="https://man.openbsd.org/OpenBSD-4.0/vga.4">vga(4)</a>
 may allow an attacker to gain root privileges if the kernel is compiled with  may allow an attacker to gain root privileges if the kernel is compiled with
 <tt>option PCIAGP</tt>  <code>option PCIAGP</code>
 and the actual device is not an AGP device.  and the actual device is not an AGP device.
 The <tt>PCIAGP</tt> option is present by default on i386  The <code>PCIAGP</code> option is present by default on i386
 kernels only.  kernels only.
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch">
Line 209 
Line 207 
 <p>  <p>
   
 <li id="ports-tar">  <li id="ports-tar">
 <font color="#009000"><strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong></font>  <strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The <strong>src.tar.gz</strong> and <strong>ports.tar.gz</strong> archives  The <b>src.tar.gz</b> and <b>ports.tar.gz</b> archives
 released on FTP were created incorrectly, a week after the 4.0 release. The  released on FTP were created incorrectly, a week after the 4.0 release. The
 archives on the CD sets are correct; this only affects people who downloaded  archives on the CD sets are correct; this only affects people who downloaded
 them from a <a href="ftp.html">mirror</a>.  them from a <a href="ftp.html">mirror</a>.
Line 225 
Line 223 
 <p>  <p>
   
 <li id="ldso">  <li id="ldso">
 <font color="#009000"><strong>005: SECURITY FIX: November 19, 2006</strong></font>  <strong>005: SECURITY FIX: November 19, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The ELF  The ELF
 <a href="https://man.openbsd.org/OpenBSD-4.0/ld.so.1">ld.so(1)</a>  <a href="https://man.openbsd.org/OpenBSD-4.0/ld.so.1">ld.so(1)</a>
Line 238 
Line 236 
 <p>  <p>
   
 <li id="arc">  <li id="arc">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 7, 2006</strong></font>  <strong>004: RELIABILITY FIX: November 7, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the  Due to a bug in the
 <a href="https://man.openbsd.org/OpenBSD-4.0/arc.4">arc(4)</a>  <a href="https://man.openbsd.org/OpenBSD-4.0/arc.4">arc(4)</a>
Line 252 
Line 250 
 <p>  <p>
   
 <li id="systrace">  <li id="systrace">
 <font color="#009000"><strong>003: SECURITY FIX: November 4, 2006</strong></font>  <strong>003: SECURITY FIX: November 4, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
 <a href="https://man.openbsd.org/OpenBSD-4.0/systrace.4">systrace(4)</a>'s  <a href="https://man.openbsd.org/OpenBSD-4.0/systrace.4">systrace(4)</a>'s
Line 265 
Line 263 
 <p>  <p>
   
 <li id="openssl2">  <li id="openssl2">
 <font color="#009000"><strong>002: SECURITY FIX: November 4, 2006</strong></font>  <strong>002: SECURITY FIX: November 4, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
 structures an error condition is mishandled, possibly resulting in an infinite  structures an error condition is mishandled, possibly resulting in an infinite
Line 284 
Line 282 
 <p>  <p>
   
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>001: SECURITY FIX: November 4, 2006</strong></font>  <strong>001: SECURITY FIX: November 4, 2006</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-4.0/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-4.0/httpd.8">httpd(8)</a>
 does not sanitize the Expect header from an HTTP request when it is  does not sanitize the Expect header from an HTTP request when it is
Line 300 
Line 298 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.67  
changed lines
  Added in v.1.68