[BACK]Return to errata42.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata42.html between version 1.65 and 1.66

version 1.65, 2019/04/02 12:46:57 version 1.66, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 4.2 Errata</title>  <title>OpenBSD 4.2 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata42.html">  <link rel="canonical" href="https://www.openbsd.org/errata42.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">4.2 Errata</font>  4.2 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="p015_ndp">  <li id="p015_ndp">
 <font color="#009000"><strong>015: SECURITY FIX: October 2, 2008</strong></font>  <strong>015: SECURITY FIX: October 2, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor  The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
 solicitation requests maybe allowing a nearby attacker to intercept traffic.  solicitation requests maybe allowing a nearby attacker to intercept traffic.
Line 101 
Line 99 
 <p>  <p>
   
 <li id="p014_pcb">  <li id="p014_pcb">
 <font color="#009000"><strong>014: RELIABILITY FIX: July 29, 2008</strong></font>  <strong>014: RELIABILITY FIX: July 29, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Some kinds of IPv6 usage would leak kernel memory (in particular, this path  Some kinds of IPv6 usage would leak kernel memory (in particular, this path
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
Line 112 
Line 110 
 <p>  <p>
   
 <li id="p013_bind">  <li id="p013_bind">
 <font color="#009000"><strong>013: SECURITY FIX: July 23, 2008</strong></font>  <strong>013: SECURITY FIX: July 23, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, July 23, 2008</strong><br>  <b>2nd revision, July 23, 2008</b><br>
 A vulnerability has been found with BIND. An attacker could use this vulnerability  A vulnerability has been found with BIND. An attacker could use this vulnerability
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
Line 124 
Line 122 
 <p>  <p>
   
 <li id="p012_xorg2">  <li id="p012_xorg2">
 <font color="#009000"><strong>012: SECURITY FIX: July 15, 2008</strong></font>  <strong>012: SECURITY FIX: July 15, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 RENDER Extension heap buffer overflow,  RENDER Extension heap buffer overflow,
Line 143 
Line 141 
 <p>  <p>
   
 <li id="p011_openssh2">  <li id="p011_openssh2">
 <font color="#009000"><strong>011: SECURITY FIX: April 3, 2008</strong></font>  <strong>011: SECURITY FIX: April 3, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
Line 153 
Line 151 
 <p>  <p>
   
 <li id="p010_openssh">  <li id="p010_openssh">
 <font color="#009000"><strong>010: SECURITY FIX: March 30, 2008</strong></font>  <strong>010: SECURITY FIX: March 30, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
Line 164 
Line 162 
 <p>  <p>
   
 <li id="p009_ppp">  <li id="p009_ppp">
 <font color="#009000"><strong>009: SECURITY FIX: March 7, 2008</strong></font>  <strong>009: SECURITY FIX: March 7, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/009_ppp.patch">
Line 172 
Line 170 
 <p>  <p>
   
 <li id="p008_ip6rthdr">  <li id="p008_ip6rthdr">
 <font color="#009000"><strong>008: RELIABILITY FIX: February 25, 2008</strong></font>  <strong>008: RELIABILITY FIX: February 25, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malformed IPv6 routing headers can cause a kernel panic.<br>  Malformed IPv6 routing headers can cause a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/008_ip6rthdr.patch">
Line 180 
Line 178 
 <p>  <p>
   
 <li id="p007_tcprespond">  <li id="p007_tcprespond">
 <font color="#009000"><strong>007: RELIABILITY FIX: February 22, 2008</strong></font>  <strong>007: RELIABILITY FIX: February 22, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/007_tcprespond.patch">
Line 188 
Line 186 
 <p>  <p>
   
 <li id="p006_xorg">  <li id="p006_xorg">
 <font color="#009000"><strong>006: SECURITY FIX: February 8, 2008</strong></font>  <strong>006: SECURITY FIX: February 8, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, February 10, 2008</strong><br>  <b>2nd revision, February 10, 2008</b><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 XFree86 Misc extension out of bounds array index,  XFree86 Misc extension out of bounds array index,
 File existence disclosure,  File existence disclosure,
Line 210 
Line 208 
 <p>  <p>
   
 <li id="p005_ifrtlabel">  <li id="p005_ifrtlabel">
 <font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font>  <strong>005: RELIABILITY FIX: January 11, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing NULL pointer check can lead to a kernel panic.<br>  A missing NULL pointer check can lead to a kernel panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/005_ifrtlabel.patch">
Line 218 
Line 216 
 <p>  <p>
   
 <li id="p004_pf">  <li id="p004_pf">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 27, 2007</strong></font>  <strong>004: RELIABILITY FIX: November 27, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A memory leak in pf can lead to machine lockups.<br>  A memory leak in pf can lead to machine lockups.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/004_pf.patch">
Line 226 
Line 224 
 <p>  <p>
   
 <li id="p003_i386_boot">  <li id="p003_i386_boot">
 <font color="#009000"><strong>003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007</strong></font>  <strong>003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 Some older BIOSes are unable to boot CD1 (ie. the commercial release sold  Some older BIOSes are unable to boot CD1 (ie. the commercial release sold
 by the project, not the CD images available on the net).  by the project, not the CD images available on the net).
Line 236 
Line 234 
   
 <ol>  <ol>
 <li>Insert CD2 and tell your computer to boot it;<br>  <li>Insert CD2 and tell your computer to boot it;<br>
 <li>When the <tt>boot></tt> prompt appears, stop the automatic boot  <li>When the <code>boot></code> prompt appears, stop the automatic boot
 by pressing the space bar;<br>  by pressing the space bar;<br>
 <li>Remove CD2 and insert CD1;<br>  <li>Remove CD2 and insert CD1;<br>
 <li>Erase the character you typed to stop the boot, type<br>  <li>Erase the character you typed to stop the boot, type<br>
 <tt><b>boot /4.2/i386/bsd.rd</b></tt><br>  <code><b>boot /4.2/i386/bsd.rd</b></code><br>
 then press <i>Enter</i>.  then press <i>Enter</i>.
 </ol>  </ol>
   
 <p>  <p>
   
 <li id="p002_openssl">  <li id="p002_openssl">
 <font color="#009000"><strong>002: SECURITY FIX: October 10, 2007</strong></font>  <strong>002: SECURITY FIX: October 10, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch">
Line 255 
Line 253 
 <p>  <p>
   
 <li id="p001_dhcpd">  <li id="p001_dhcpd">
 <font color="#009000"><strong>001: SECURITY FIX: October 8, 2007</strong></font>  <strong>001: SECURITY FIX: October 8, 2007</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
 A DHCP client that claimed to require a maximum message size less than  A DHCP client that claimed to require a maximum message size less than
Line 268 
Line 266 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.65  
changed lines
  Added in v.1.66