version 1.1, 2007/03/06 02:06:02 |
version 1.2, 2007/04/28 05:21:52 |
|
|
|
|
<ul> |
<ul> |
|
|
<li>No patches yet, because it is not released yet! |
<li><a name="006_altivec"></a> |
|
<font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font> <i>PowerPC</i><br> |
|
An unhandled AltiVec assist exception can cause a kernel panic.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="012_route6"></a> |
|
<font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font> <i>All architectures</i><br> |
|
IPv6 type 0 route headers can be used to mount a DoS attack against |
|
hosts and networks. This is a design flaw in IPv6 and not a bug in |
|
OpenBSD.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="004_xorg"></a> |
|
<font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font> <i>All architectures</i><br> |
|
Multiple vulnerabilities have been discovered in X.Org.<br> |
|
XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability, |
|
BDFFont parsing integer overflow vulnerability, |
|
fonts.dir file parsing integer overflow vulnerability, |
|
multiple integer overflows in the XGetPixel() and XInitImage functions |
|
in ImUtil.c. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="003_spamd"></a> |
|
<font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font> <i>All architectures</i><br> |
|
Bugs found in the spamd sychronization mechanism could cause corrupted |
|
databases.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="002_splnet"></a> |
|
<font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font> <i>All architectures</i><br> |
|
Incorrect spl level can lead to panics under heavy kqueue usage.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="001_mbuf"></a> |
|
<font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font> <i>All architectures</i><br> |
|
Incorrect mbuf handling for ICMP6 packets.<br> |
|
Using |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a> |
|
to avoid the problem packets is an effective workaround until the patch |
|
can be installed.<br> |
|
Use "block in inet6" in /etc/pf.conf |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
|
</ul> |
</ul> |
|
|