[BACK]Return to errata42.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata42.html between version 1.43 and 1.44

version 1.43, 2014/03/31 03:12:47 version 1.44, 2014/03/31 16:02:48
Line 78 
Line 78 
 <ul>  <ul>
   
 <li><a name="015_ndp"></a>  <li><a name="015_ndp"></a>
 <font color="#009000"><strong>015: SECURITY FIX: October 2, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>015: SECURITY FIX: October 2, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor  The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
 solicitation requests maybe allowing a nearby attacker to intercept traffic.  solicitation requests maybe allowing a nearby attacker to intercept traffic.
 The attacker must have IPv6 connectivity to the same router as their target for  The attacker must have IPv6 connectivity to the same router as their target for
Line 90 
Line 91 
 <p>  <p>
   
 <li><a name="014_pcb"></a>  <li><a name="014_pcb"></a>
 <font color="#009000"><strong>014: RELIABILITY FIX: July 29, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>014: RELIABILITY FIX: July 29, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Some kinds of IPv6 usage would leak kernel memory (in particular, this path  Some kinds of IPv6 usage would leak kernel memory (in particular, this path
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
 enabled by default, this condition affects all systems.  enabled by default, this condition affects all systems.
Line 100 
Line 102 
 <p>  <p>
   
 <li><a name="013_bind"></a>  <li><a name="013_bind"></a>
 <font color="#009000"><strong>013: SECURITY FIX: July 23, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: SECURITY FIX: July 23, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, July 23, 2008</strong><br>  <strong>2nd revision, July 23, 2008</strong><br>
 A vulnerability has been found with BIND. An attacker could use this vulnerability  A vulnerability has been found with BIND. An attacker could use this vulnerability
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
Line 111 
Line 114 
 <p>  <p>
   
 <li><a name="012_xorg2"></a>  <li><a name="012_xorg2"></a>
 <font color="#009000"><strong>012: SECURITY FIX: July 15, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>012: SECURITY FIX: July 15, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 RENDER Extension heap buffer overflow,  RENDER Extension heap buffer overflow,
 RENDER Extension crash,  RENDER Extension crash,
Line 129 
Line 133 
 <p>  <p>
   
 <li><a name="011_openssh2"></a>  <li><a name="011_openssh2"></a>
 <font color="#009000"><strong>011: SECURITY FIX: April 3, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: SECURITY FIX: April 3, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
Line 138 
Line 143 
 <p>  <p>
   
 <li><a name="010_openssh"></a>  <li><a name="010_openssh"></a>
 <font color="#009000"><strong>010: SECURITY FIX: March 30, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: SECURITY FIX: March 30, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
Line 148 
Line 154 
 <p>  <p>
   
 <li><a name="009_ppp"></a>  <li><a name="009_ppp"></a>
 <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="008_ip6rthdr"></a>  <li><a name="008_ip6rthdr"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Malformed IPv6 routing headers can cause a kernel panic.<br>  Malformed IPv6 routing headers can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="007_tcprespond"></a>  <li><a name="007_tcprespond"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="006_xorg"></a>  <li><a name="006_xorg"></a>
 <font color="#009000"><strong>006: SECURITY FIX: February 8, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>006: SECURITY FIX: February 8, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, February 10, 2008</strong><br>  <strong>2nd revision, February 10, 2008</strong><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XFree86 Misc extension out of bounds array index,  XFree86 Misc extension out of bounds array index,
Line 190 
Line 200 
 <p>  <p>
   
 <li><a name="005_ifrtlabel"></a>  <li><a name="005_ifrtlabel"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font>
   &nbsp; <i>All architectures</i><br>
 A missing NULL pointer check can lead to a kernel panic.<br>  A missing NULL pointer check can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="004_pf"></a>  <li><a name="004_pf"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 A memory leak in pf can lead to machine lockups.<br>  A memory leak in pf can lead to machine lockups.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="003_i386_boot"></a>  <li><a name="003_i386_boot"></a>
 <font color="#009000"><strong>003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007</strong></font> &nbsp; <i>i386 only</i><br>  <font color="#009000"><strong>003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007</strong></font>
   &nbsp; <i>i386 only</i><br>
 Some older BIOSes are unable to boot CD1 (ie. the commercial release sold  Some older BIOSes are unable to boot CD1 (ie. the commercial release sold
 by the project, not the CD images available on the net).  by the project, not the CD images available on the net).
 A workaround using CD2 (amd64 architecture) is as follows.  A workaround using CD2 (amd64 architecture) is as follows.
Line 224 
Line 237 
 <p>  <p>
   
 <li><a name="002_openssl"></a>  <li><a name="002_openssl"></a>
 <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="001_dhcpd"></a>  <li><a name="001_dhcpd"></a>
 <font color="#009000"><strong>001: SECURITY FIX: October 8, 2007</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: SECURITY FIX: October 8, 2007</strong></font>
   &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.

Legend:
Removed from v.1.43  
changed lines
  Added in v.1.44