[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.1 and 1.2

version 1.1, 2007/03/06 02:06:02 version 1.2, 2007/04/28 05:21:52
Line 81 
Line 81 
   
 <ul>  <ul>
   
 <li>No patches yet, because it is not released yet!  <li><a name="006_altivec"></a>
   <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>PowerPC</i><br>
   An unhandled AltiVec assist exception can cause a kernel panic.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="012_route6"></a>
   <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
   IPv6 type 0 route headers can be used to mount a DoS attack against
   hosts and networks.  This is a design flaw in IPv6 and not a bug in
   OpenBSD.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="004_xorg"></a>
   <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
   Multiple vulnerabilities have been discovered in X.Org.<br>
   XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,
   BDFFont parsing integer overflow vulnerability,
   fonts.dir file parsing integer overflow vulnerability,
   multiple integer overflows in the XGetPixel() and XInitImage functions
   in ImUtil.c.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="003_spamd"></a>
   <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
   Bugs found in the spamd sychronization mechanism could cause corrupted
   databases.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="002_splnet"></a>
   <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
   Incorrect spl level can lead to panics under heavy kqueue usage.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="001_mbuf"></a>
   <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
   Incorrect mbuf handling for ICMP6 packets.<br>
   Using
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a>
   to avoid the problem packets is an effective workaround until the patch
   can be installed.<br>
   Use "block in inet6" in /etc/pf.conf
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   
 </ul>  </ul>
   

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.2