[BACK]Return to errata43.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata43.html between version 1.62 and 1.63

version 1.62, 2019/04/02 12:46:57 version 1.63, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 4.3 Errata</title>  <title>OpenBSD 4.3 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata43.html">  <link rel="canonical" href="https://www.openbsd.org/errata43.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">4.3 Errata</font>  4.3 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 88 
Line 86 
 <ul>  <ul>
   
 <li id="p013_pf">  <li id="p013_pf">
 <font color="#009000"><strong>013: RELIABILITY FIX: April 11, 2009</strong></font>  <strong>013: RELIABILITY FIX: April 11, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When pf attempts to perform translation on a specially crafted IP datagram,  When pf attempts to perform translation on a specially crafted IP datagram,
 a null pointer dereference will occur, resulting in a kernel panic.  a null pointer dereference will occur, resulting in a kernel panic.
Line 109 
Line 107 
 <p>  <p>
   
 <li id="p012_openssl">  <li id="p012_openssl">
 <font color="#009000"><strong>012: RELIABILITY FIX: April 8, 2009</strong></font>  <strong>012: RELIABILITY FIX: April 8, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The OpenSSL ASN.1 handling code could be forced to perform invalid memory  The OpenSSL ASN.1 handling code could be forced to perform invalid memory
 accesses through the use of certain invalid strings  accesses through the use of certain invalid strings
Line 127 
Line 125 
 <p>  <p>
   
 <li id="p011_sudo">  <li id="p011_sudo">
 <font color="#009000"><strong>011: SECURITY FIX: February 22, 2009</strong></font>  <strong>011: SECURITY FIX: February 22, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 sudo(8) may allow a user listed in the sudoers file to run a command  sudo(8) may allow a user listed in the sudoers file to run a command
 as a different user than their access rule specifies when a Unix  as a different user than their access rule specifies when a Unix
Line 140 
Line 138 
 <p>  <p>
   
 <li id="p010_bgpd">  <li id="p010_bgpd">
 <font color="#009000"><strong>010: RELIABILITY FIX: February 18, 2009</strong></font>  <strong>010: RELIABILITY FIX: February 18, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 bgpd(8) did not correctly prepend its own AS to very long AS paths, causing  bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
 the process to terminate because of the resulting corrupt path.  the process to terminate because of the resulting corrupt path.
Line 150 
Line 148 
 <p>  <p>
   
 <li id="p009_bgpd">  <li id="p009_bgpd">
 <font color="#009000"><strong>009: RELIABILITY FIX: January 30, 2009</strong></font>  <strong>009: RELIABILITY FIX: January 30, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Upon reception of an invalid update with 4-byte AS attributes, bgpd -  Upon reception of an invalid update with 4-byte AS attributes, bgpd -
 adhering to the RFCs - closed the session to the neighbor.  adhering to the RFCs - closed the session to the neighbor.
Line 163 
Line 161 
 <p>  <p>
   
 <li id="p008_bind">  <li id="p008_bind">
 <font color="#009000"><strong>008: SECURITY FIX: January 14, 2009</strong></font>  <strong>008: SECURITY FIX: January 14, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 named(8) did not correctly check the return value of a DSA verification  named(8) did not correctly check the return value of a DSA verification
 function, potentially allowing bypass of verification of DNSSEC DSA  function, potentially allowing bypass of verification of DNSSEC DSA
Line 175 
Line 173 
 <p>  <p>
   
 <li id="p007_openssl">  <li id="p007_openssl">
 <font color="#009000"><strong>007: SECURITY FIX: January 9, 2009</strong></font>  <strong>007: SECURITY FIX: January 9, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The OpenSSL libraries did not correctly check the return value from  The OpenSSL libraries did not correctly check the return value from
 certain verification functions, allowing validation to be bypassed and  certain verification functions, allowing validation to be bypassed and
Line 189 
Line 187 
 <p>  <p>
   
 <li id="p006_ndp">  <li id="p006_ndp">
 <font color="#009000"><strong>006: SECURITY FIX: October 2, 2008</strong></font>  <strong>006: SECURITY FIX: October 2, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor  The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
 solicitation requests maybe allowing a nearby attacker to intercept traffic.  solicitation requests maybe allowing a nearby attacker to intercept traffic.
Line 202 
Line 200 
 <p>  <p>
   
 <li id="p005_pcb">  <li id="p005_pcb">
 <font color="#009000"><strong>005: RELIABILITY FIX: July 29, 2008</strong></font>  <strong>005: RELIABILITY FIX: July 29, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Some kinds of IPv6 usage would leak kernel memory (in particular, this path  Some kinds of IPv6 usage would leak kernel memory (in particular, this path
 was exercised by the named(8) patch for port randomization).  Since INET6 is  was exercised by the named(8) patch for port randomization).  Since INET6 is
Line 213 
Line 211 
 <p>  <p>
   
 <li id="p004_bind">  <li id="p004_bind">
 <font color="#009000"><strong>004: SECURITY FIX: July 23, 2008</strong></font>  <strong>004: SECURITY FIX: July 23, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, July 23, 2008</strong><br>  <b>2nd revision, July 23, 2008</b><br>
 A vulnerability has been found with BIND. An attacker could use this vulnerability  A vulnerability has been found with BIND. An attacker could use this vulnerability
 to poison the cache of a recursive resolving name server.  to poison the cache of a recursive resolving name server.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</a>.
Line 225 
Line 223 
 <p>  <p>
   
 <li id="p003_xorg">  <li id="p003_xorg">
 <font color="#009000"><strong>003: SECURITY FIX: July 15, 2008</strong></font>  <strong>003: SECURITY FIX: July 15, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
 RENDER Extension heap buffer overflow,  RENDER Extension heap buffer overflow,
Line 244 
Line 242 
 <p>  <p>
   
 <li id="p002_openssh2">  <li id="p002_openssh2">
 <font color="#009000"><strong>002: SECURITY FIX: April 3, 2008</strong></font>  <strong>002: SECURITY FIX: April 3, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
 by refusing to listen on a port unless all address families bind  by refusing to listen on a port unless all address families bind
Line 254 
Line 252 
 <p>  <p>
   
 <li id="p001_openssh">  <li id="p001_openssh">
 <font color="#009000"><strong>001: SECURITY FIX: March 30, 2008</strong></font>  <strong>001: SECURITY FIX: March 30, 2008</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
 directive was in effect, allowing users with write access to this file to  directive was in effect, allowing users with write access to this file to
Line 267 
Line 265 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.62  
changed lines
  Added in v.1.63