[BACK]Return to errata43.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata43.html between version 1.54 and 1.55

version 1.54, 2016/08/15 02:22:06 version 1.55, 2016/10/16 19:11:30
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 104 
Line 104 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 122 
Line 122 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/012_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/012_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 135 
Line 135 
 when the user being granted privileges is also a member of the group  when the user being granted privileges is also a member of the group
 in the RunAs portion of the rule.  in the RunAs portion of the rule.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/011_sudo.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/011_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 145 
Line 145 
 bgpd(8) did not correctly prepend its own AS to very long AS paths, causing  bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
 the process to terminate because of the resulting corrupt path.  the process to terminate because of the resulting corrupt path.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/010_bgpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/010_bgpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 158 
Line 158 
 sessions.  sessions.
 In the worst case Internet connectivity could be lost.  In the worst case Internet connectivity could be lost.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/009_bgpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/009_bgpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 170 
Line 170 
 signatures.  signatures.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 184 
Line 184 
 certificate.  certificate.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 197 
Line 197 
 this vulnerability to be exploited.  this vulnerability to be exploited.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/006_ndp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/006_ndp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 208 
Line 208 
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
 enabled by default, this condition affects all systems.  enabled by default, this condition affects all systems.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/005_pcb.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/005_pcb.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 220 
Line 220 
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/004_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/004_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 239 
Line 239 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/003_xorg.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/003_xorg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 249 
Line 249 
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
 successfully.<br>  successfully.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/002_openssh2.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/002_openssh2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 260 
Line 260 
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
 execute arbitrary commands. This behaviour was documented, but was an unsafe  execute arbitrary commands. This behaviour was documented, but was an unsafe
 default and an extra hassle for administrators.<br>  default and an extra hassle for administrators.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/001_openssh.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/001_openssh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.54  
changed lines
  Added in v.1.55