[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.36 and 1.37

version 1.36, 2014/03/31 03:12:47 version 1.37, 2014/03/31 16:02:48
Line 79 
Line 79 
 <ul>  <ul>
   
 <li><a name="016_openssh2"></a>  <li><a name="016_openssh2"></a>
 <font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
Line 88 
Line 89 
 <p>  <p>
   
 <li><a name="015_openssh"></a>  <li><a name="015_openssh"></a>
 <font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
Line 98 
Line 100 
 <p>  <p>
   
 <li><a name="014_ppp"></a>  <li><a name="014_ppp"></a>
 <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_tcprespond"></a>  <li><a name="013_tcprespond"></a>
 <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_xorg"></a>  <li><a name="012_xorg"></a>
 <font color="#009000"><strong>012: SECURITY FIX: February 8, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>012: SECURITY FIX: February 8, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, February 10, 2008</strong><br>  <strong>2nd revision, February 10, 2008</strong><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XFree86 Misc extension out of bounds array index,  XFree86 Misc extension out of bounds array index,
Line 133 
Line 138 
 <p>  <p>
   
 <li><a name="011_openssl"></a>  <li><a name="011_openssl"></a>
 <font color="#009000"><strong>011: SECURITY FIX: October 10, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: SECURITY FIX: October 10, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">
Line 141 
Line 147 
 <p>  <p>
   
 <li><a name="010_dhcpd"></a>  <li><a name="010_dhcpd"></a>
 <font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
Line 151 
Line 158 
 <p>  <p>
   
 <li><a name="009_file"></a>  <li><a name="009_file"></a>
 <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>
   &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="008_xorg"></a>  <li><a name="008_xorg"></a>
 <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font> &nbsp; <i>All Architectures</i><br>  <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>
   &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="007_kroute"></a>  <li><a name="007_kroute"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Link state is not correctly tracked in ospfd and ripd.<br>  Link state is not correctly tracked in ospfd and ripd.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="006_altivec"></a>  <li><a name="006_altivec"></a>
 <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>PowerPC</i><br>  <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="005_route6"></a>  <li><a name="005_route6"></a>
 <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
Line 188 
Line 200 
 <p>  <p>
   
 <li><a name="004_xorg"></a>  <li><a name="004_xorg"></a>
 <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,  XC-MISC extension ProcXCMiscGetXIDList memory corruption vulnerability,
 BDFFont parsing integer overflow vulnerability,  BDFFont parsing integer overflow vulnerability,
Line 205 
Line 218 
 <p>  <p>
   
 <li><a name="003_spamd"></a>  <li><a name="003_spamd"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Bugs found in the spamd sychronization mechanism could cause corrupted  Bugs found in the spamd sychronization mechanism could cause corrupted
 databases.<br>  databases.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">
Line 213 
Line 227 
 <p>  <p>
   
 <li><a name="002_splnet"></a>  <li><a name="002_splnet"></a>
 <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Incorrect spl level can lead to panics under heavy kqueue usage.<br>  Incorrect spl level can lead to panics under heavy kqueue usage.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="001_mbuf"></a>  <li><a name="001_mbuf"></a>
 <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Incorrect mbuf handling for ICMP6 packets.<br>  Incorrect mbuf handling for ICMP6 packets.<br>
 Using  Using
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a>

Legend:
Removed from v.1.36  
changed lines
  Added in v.1.37