[BACK]Return to errata42.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata42.html between version 1.57 and 1.58

version 1.57, 2016/08/15 02:22:06 version 1.58, 2016/10/16 19:11:29
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 96 
Line 96 
 this vulnerability to be exploited.  this vulnerability to be exploited.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/015_ndp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/015_ndp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 107 
Line 107 
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
 enabled by default, this condition affects all systems.  enabled by default, this condition affects all systems.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/014_pcb.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/014_pcb.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 119 
Line 119 
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/013_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/013_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 138 
Line 138 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 148 
Line 148 
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/011_openssh2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/011_openssh2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 159 
Line 159 
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/010_openssh.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/010_openssh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 167 
Line 167 
 <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 175 
Line 175 
 <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malformed IPv6 routing headers can cause a kernel panic.<br>  Malformed IPv6 routing headers can cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 183 
Line 183 
 <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 205 
Line 205 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/006_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/006_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 213 
Line 213 
 <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing NULL pointer check can lead to a kernel panic.<br>  A missing NULL pointer check can lead to a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 221 
Line 221 
 <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A memory leak in pf can lead to machine lockups.<br>  A memory leak in pf can lead to machine lockups.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 250 
Line 250 
 <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 261 
Line 261 
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
 the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.  the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/001_dhcpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/001_dhcpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.57  
changed lines
  Added in v.1.58