[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.35 and 1.36

version 1.35, 2014/03/28 03:04:30 version 1.36, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2007 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_4_1</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_4_1</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <!-- Temporarily put anchors for all archs here.  Remove later. -->  
 <a name="all"></a>  
 <a name="alpha"></a>  
 <a name="amd64"></a>  
 <a name="armish"></a>  
 <a name="cats"></a>  
 <a name="hp300"></a>  
 <a name="hppa"></a>  
 <a name="i386"></a>  
 <a name="luna88k"></a>  
 <a name="mac68k"></a>  
 <a name="macppc"></a>  
 <a name="mvme68k"></a>  
 <a name="mvme88k"></a>  
 <a name="sgi"></a>  
 <a name="sparc"></a>  
 <a name="sparc64"></a>  
 <a name="vax"></a>  
 <a name="zaurus"></a>  
   
 <ul>  <ul>
   
 <li><a name="016_openssh2"></a>  <li><a name="016_openssh2"></a>
Line 102 
Line 84 
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/016_openssh2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/016_openssh2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="015_openssh"></a>  <li><a name="015_openssh"></a>
Line 112 
Line 94 
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/015_openssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/015_openssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="014_ppp"></a>  <li><a name="014_ppp"></a>
 <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_tcprespond"></a>  <li><a name="013_tcprespond"></a>
 <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_xorg"></a>  <li><a name="012_xorg"></a>
Line 147 
Line 129 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/012_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/012_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="011_openssl"></a>  <li><a name="011_openssl"></a>
Line 155 
Line 137 
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="010_dhcpd"></a>  <li><a name="010_dhcpd"></a>
Line 165 
Line 147 
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/010_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/010_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="009_file"></a>  <li><a name="009_file"></a>
 <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="008_xorg"></a>  <li><a name="008_xorg"></a>
 <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="007_kroute"></a>  <li><a name="007_kroute"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font> &nbsp; <i>All architectures</i><br>
 Link state is not correctly tracked in ospfd and ripd.<br>  Link state is not correctly tracked in ospfd and ripd.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="006_altivec"></a>  <li><a name="006_altivec"></a>
 <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>PowerPC</i><br>  <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="005_route6"></a>  <li><a name="005_route6"></a>
Line 202 
Line 184 
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="004_xorg"></a>  <li><a name="004_xorg"></a>
Line 219 
Line 201 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="003_spamd"></a>  <li><a name="003_spamd"></a>
Line 227 
Line 209 
 Bugs found in the spamd sychronization mechanism could cause corrupted  Bugs found in the spamd sychronization mechanism could cause corrupted
 databases.<br>  databases.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="002_splnet"></a>  <li><a name="002_splnet"></a>
 <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
 Incorrect spl level can lead to panics under heavy kqueue usage.<br>  Incorrect spl level can lead to panics under heavy kqueue usage.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="001_mbuf"></a>  <li><a name="001_mbuf"></a>
Line 247 
Line 229 
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 </ul>  </ul>

Legend:
Removed from v.1.35  
changed lines
  Added in v.1.36