[BACK]Return to errata43.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata43.html between version 1.27 and 1.28

version 1.27, 2010/03/08 21:53:37 version 1.28, 2010/07/08 19:00:07
Line 54 
Line 54 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 104 
Line 104 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 121 
Line 121 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/012_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/012_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 133 
Line 133 
 when the user being granted privileges is also a member of the group  when the user being granted privileges is also a member of the group
 in the RunAs portion of the rule.  in the RunAs portion of the rule.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/011_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/011_sudo.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 142 
Line 142 
 bgpd(8) did not correctly prepend its own AS to very long AS paths, causing  bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
 the process to terminate because of the resulting corrupt path.  the process to terminate because of the resulting corrupt path.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/010_bgpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/010_bgpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 154 
Line 154 
 sessions.  sessions.
 In the worst case Internet connectivity could be lost.  In the worst case Internet connectivity could be lost.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/009_bgpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/009_bgpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 165 
Line 165 
 signatures.  signatures.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 178 
Line 178 
 certificate.  certificate.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 190 
Line 190 
 this vulnerability to be exploited.  this vulnerability to be exploited.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/006_ndp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/006_ndp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 200 
Line 200 
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
 enabled by default, this condition affects all systems.  enabled by default, this condition affects all systems.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/005_pcb.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/005_pcb.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 211 
Line 211 
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/004_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/004_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 229 
Line 229 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/003_xorg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/003_xorg.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 238 
Line 238 
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/002_openssh2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/002_openssh2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 248 
Line 248 
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/001_openssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/001_openssh.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   

Legend:
Removed from v.1.27  
changed lines
  Added in v.1.28