[BACK]Return to errata40.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata40.html between version 1.44 and 1.45

version 1.44, 2014/10/02 14:34:45 version 1.45, 2015/02/14 04:36:51
Line 83 
Line 83 
   
 <ul>  <ul>
   
 <li><a name="017_openssl"></a>  <li id="017_openssl">
 <font color="#009000"><strong>017: SECURITY FIX: October 10, 2007</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: October 10, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
Line 92 
Line 92 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="016_dhcpd"></a>  <li id="016_dhcpd">
 <font color="#009000"><strong>016: SECURITY FIX: October 8, 2007</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: October 8, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
Line 103 
Line 103 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="015_file"></a>  <li id="015_file">
 <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: July 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
Line 111 
Line 111 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="014_xorg"></a>  <li id="014_xorg">
 <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font>  <font color="#009000"><strong>014: STABILITY FIX: May 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
Line 119 
Line 119 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_altivec"></a>  <li id="013_altivec">
 <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font>  <font color="#009000"><strong>013: STABILITY FIX: April 26, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
Line 127 
Line 127 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_route6"></a>  <li id="012_route6">
 <font color="#009000"><strong>012: SECURITY FIX: April 23, 2007</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: April 23, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
Line 137 
Line 137 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="011_xorg"></a>  <li id="011_xorg">
 <font color="#009000"><strong>011: SECURITY FIX: April 4, 2007</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: April 4, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
Line 155 
Line 155 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="m_dup1"></a>  <li id="m_dup1">
 <font color="#009000"><strong>010: SECURITY FIX: March 7, 2007</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: March 7, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, March 17, 2007</strong><br>  <strong>2nd revision, March 17, 2007</strong><br>
Line 170 
Line 170 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="timezone"></a>  <li id="timezone">
 <font color="#009000"><strong>009: INTEROPERABILITY FIX: February 4, 2007</strong></font>  <font color="#009000"><strong>009: INTEROPERABILITY FIX: February 4, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A US daylight saving time rules change takes effect in 2007.  A US daylight saving time rules change takes effect in 2007.
Line 179 
Line 179 
 A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>  A source code patch exists which syncs the timezone data files with tzdata2007a</a>.<br>
 <p>  <p>
   
 <li><a name="icmp6"></a>  <li id="icmp6">
 <font color="#009000"><strong>008: RELIABILITY FIX: January 16, 2007</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: January 16, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under some circumstances, processing an ICMP6 echo request would cause  Under some circumstances, processing an ICMP6 echo request would cause
Line 189 
Line 189 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="agp"></a>  <li id="agp">
 <font color="#009000"><strong>007: SECURITY FIX: January 3, 2007</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: January 3, 2007</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 Insufficient validation in  Insufficient validation in
Line 204 
Line 204 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ports-tar"></a>  <li id="ports-tar">
 <font color="#009000"><strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong></font>  <font color="#009000"><strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The <strong>src.tar.gz</strong> and <strong>ports.tar.gz</strong> archives  The <strong>src.tar.gz</strong> and <strong>ports.tar.gz</strong> archives
Line 220 
Line 220 
 <br>  <br>
 <p>  <p>
   
 <li><a name="ldso"></a>  <li id="ldso">
 <font color="#009000"><strong>005: SECURITY FIX: November 19, 2006</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: November 19, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The ELF  The ELF
Line 233 
Line 233 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="arc"></a>  <li id="arc">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 7, 2006</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: November 7, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the  Due to a bug in the
Line 247 
Line 247 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="systrace"></a>  <li id="systrace">
 <font color="#009000"><strong>003: SECURITY FIX: November 4, 2006</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: November 4, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix for an integer overflow in  Fix for an integer overflow in
Line 260 
Line 260 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="openssl2"></a>  <li id="openssl2">
 <font color="#009000"><strong>002: SECURITY FIX: November 4, 2006</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: November 4, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several problems have been found in OpenSSL. While parsing certain invalid ASN.1  Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
Line 279 
Line 279 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>001: SECURITY FIX: November 4, 2006</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: November 4, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>

Legend:
Removed from v.1.44  
changed lines
  Added in v.1.45