[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.62 and 1.63

version 1.62, 2019/04/02 12:46:57 version 1.63, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 4.1 Errata</title>  <title>OpenBSD 4.1 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata41.html">  <link rel="canonical" href="https://www.openbsd.org/errata41.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">4.1 Errata</font>  4.1 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="p016_openssh2">  <li id="p016_openssh2">
 <font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font>  <strong>016: SECURITY FIX: April 3, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
Line 98 
Line 96 
 <p>  <p>
   
 <li id="p015_openssh">  <li id="p015_openssh">
 <font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font>  <strong>015: SECURITY FIX: March 30, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
Line 109 
Line 107 
 <p>  <p>
   
 <li id="p014_ppp">  <li id="p014_ppp">
 <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>  <strong>014: SECURITY FIX: March 7, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">
Line 117 
Line 115 
 <p>  <p>
   
 <li id="p013_tcprespond">  <li id="p013_tcprespond">
 <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>  <strong>013: RELIABILITY FIX: February 22, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">
Line 125 
Line 123 
 <p>  <p>
   
 <li id="p012_xorg">  <li id="p012_xorg">
 <font color="#009000"><strong>012: SECURITY FIX: February 8, 2008</strong></font>  <strong>012: SECURITY FIX: February 8, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, February 10, 2008</strong><br>  <b>2nd revision, February 10, 2008</b><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XFree86 Misc extension out of bounds array index,  XFree86 Misc extension out of bounds array index,
 File existence disclosure,  File existence disclosure,
Line 147 
Line 145 
 <p>  <p>
   
 <li id="p011_openssl">  <li id="p011_openssl">
 <font color="#009000"><strong>011: SECURITY FIX: October 10, 2007</strong></font>  <strong>011: SECURITY FIX: October 10, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
Line 156 
Line 154 
 <p>  <p>
   
 <li id="p010_dhcpd">  <li id="p010_dhcpd">
 <font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font>  <strong>010: SECURITY FIX: October 8, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
Line 167 
Line 165 
 <p>  <p>
   
 <li id="p009_file">  <li id="p009_file">
 <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>  <strong>009: SECURITY FIX: July 9, 2007</strong>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">
Line 175 
Line 173 
 <p>  <p>
   
 <li id="p008_xorg">  <li id="p008_xorg">
 <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>  <strong>008: STABILITY FIX: May 9, 2007</strong>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">
Line 183 
Line 181 
 <p>  <p>
   
 <li id="p007_kroute">  <li id="p007_kroute">
 <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>  <strong>007: RELIABILITY FIX: April 30, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Link state is not correctly tracked in ospfd and ripd.<br>  Link state is not correctly tracked in ospfd and ripd.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">
Line 191 
Line 189 
 <p>  <p>
   
 <li id="p006_altivec">  <li id="p006_altivec">
 <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>  <strong>006: STABILITY FIX: April 27, 2007</strong>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">
Line 199 
Line 197 
 <p>  <p>
   
 <li id="p005_route6">  <li id="p005_route6">
 <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font>  <strong>005: SECURITY FIX: April 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
Line 209 
Line 207 
 <p>  <p>
   
 <li id="p004_xorg">  <li id="p004_xorg">
 <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font>  <strong>004: SECURITY FIX: April 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,  XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,
Line 227 
Line 225 
 <p>  <p>
   
 <li id="p003_spamd">  <li id="p003_spamd">
 <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font>  <strong>003: RELIABILITY FIX: April 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs found in the spamd sychronization mechanism could cause corrupted  Bugs found in the spamd sychronization mechanism could cause corrupted
 databases.<br>  databases.<br>
Line 236 
Line 234 
 <p>  <p>
   
 <li id="p002_splnet">  <li id="p002_splnet">
 <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>  <strong>002: STABILITY FIX: April 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect spl level can lead to panics under heavy kqueue usage.<br>  Incorrect spl level can lead to panics under heavy kqueue usage.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">
Line 244 
Line 242 
 <p>  <p>
   
 <li id="p001_mbuf">  <li id="p001_mbuf">
 <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font>  <strong>001: SECURITY FIX: April 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect mbuf handling for ICMP6 packets.<br>  Incorrect mbuf handling for ICMP6 packets.<br>
 Using  Using
Line 260 
Line 258 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.62  
changed lines
  Added in v.1.63