[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.53 and 1.54

version 1.53, 2016/08/15 02:22:06 version 1.54, 2016/10/16 19:11:29
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 93 
Line 93 
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/016_openssh2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/016_openssh2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 104 
Line 104 
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/015_openssh.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/015_openssh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 112 
Line 112 
 <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/014_ppp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 120 
Line 120 
 <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/013_tcprespond.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 142 
Line 142 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/012_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/012_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 151 
Line 151 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 162 
Line 162 
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/010_dhcpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/010_dhcpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 170 
Line 170 
 <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/009_file.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 178 
Line 178 
 <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>  <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/008_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 186 
Line 186 
 <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Link state is not correctly tracked in ospfd and ripd.<br>  Link state is not correctly tracked in ospfd and ripd.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/007_kroute.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 194 
Line 194 
 <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 204 
Line 204 
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
 hosts and networks.  This is a design flaw in IPv6 and not a bug in  hosts and networks.  This is a design flaw in IPv6 and not a bug in
 OpenBSD.<br>  OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 222 
Line 222 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 231 
Line 231 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs found in the spamd sychronization mechanism could cause corrupted  Bugs found in the spamd sychronization mechanism could cause corrupted
 databases.<br>  databases.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/003_spamd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 239 
Line 239 
 <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect spl level can lead to panics under heavy kqueue usage.<br>  Incorrect spl level can lead to panics under heavy kqueue usage.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 253 
Line 253 
 can be installed.<br>  can be installed.<br>
 Use "block in inet6" in /etc/pf.conf  Use "block in inet6" in /etc/pf.conf
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.53  
changed lines
  Added in v.1.54