[BACK]Return to errata42.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata42.html between version 1.42 and 1.43

version 1.42, 2014/03/28 03:04:30 version 1.43, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2007 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 64 
Line 63 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_4_2</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_4_2</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <!-- Temporarily put anchors for all archs here.  Remove later. -->  
 <a name="all"></a>  
 <a name="alpha"></a>  
 <a name="amd64"></a>  
 <a name="armish"></a>  
 <a name="cats"></a>  
 <a name="hp300"></a>  
 <a name="hppa"></a>  
 <a name="i386"></a>  
 <a name="luna88k"></a>  
 <a name="mac68k"></a>  
 <a name="macppc"></a>  
 <a name="mvme68k"></a>  
 <a name="mvme88k"></a>  
 <a name="sgi"></a>  
 <a name="sparc"></a>  
 <a name="sparc64"></a>  
 <a name="vax"></a>  
 <a name="zaurus"></a>  
   
 <ul>  <ul>
   
 <li><a name="015_ndp"></a>  <li><a name="015_ndp"></a>
Line 104 
Line 86 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/015_ndp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/015_ndp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="014_pcb"></a>  <li><a name="014_pcb"></a>
Line 114 
Line 96 
 enabled by default, this condition affects all systems.  enabled by default, this condition affects all systems.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/014_pcb.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/014_pcb.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_bind"></a>  <li><a name="013_bind"></a>
Line 125 
Line 107 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/013_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/013_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_xorg2"></a>  <li><a name="012_xorg2"></a>
Line 143 
Line 125 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="011_openssh2"></a>  <li><a name="011_openssh2"></a>
Line 152 
Line 134 
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/011_openssh2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/011_openssh2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="010_openssh"></a>  <li><a name="010_openssh"></a>
Line 162 
Line 144 
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/010_openssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/010_openssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="009_ppp"></a>  <li><a name="009_ppp"></a>
 <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="008_ip6rthdr"></a>  <li><a name="008_ip6rthdr"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 Malformed IPv6 routing headers can cause a kernel panic.<br>  Malformed IPv6 routing headers can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="007_tcprespond"></a>  <li><a name="007_tcprespond"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="006_xorg"></a>  <li><a name="006_xorg"></a>
Line 204 
Line 186 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/006_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/006_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="005_ifrtlabel"></a>  <li><a name="005_ifrtlabel"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font> &nbsp; <i>All architectures</i><br>
 A missing NULL pointer check can lead to a kernel panic.<br>  A missing NULL pointer check can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="004_pf"></a>  <li><a name="004_pf"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>
 A memory leak in pf can lead to machine lockups.<br>  A memory leak in pf can lead to machine lockups.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="003_i386_boot"></a>  <li><a name="003_i386_boot"></a>
Line 245 
Line 227 
 <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font> &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="001_dhcpd"></a>  <li><a name="001_dhcpd"></a>
Line 255 
Line 237 
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/001_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/001_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 </ul>  </ul>

Legend:
Removed from v.1.42  
changed lines
  Added in v.1.43