[BACK]Return to errata44.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata44.html between version 1.26 and 1.27

version 1.26, 2010/03/08 21:53:37 version 1.27, 2010/07/08 19:00:07
Line 54 
Line 54 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 92 
Line 92 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 100 
Line 100 
 <font color="#009000"><strong>015: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>  <font color="#009000"><strong>015: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 111 
Line 111 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 131 
Line 131 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 148 
Line 148 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 160 
Line 160 
 when the user being granted privileges is also a member of the group  when the user being granted privileges is also a member of the group
 in the RunAs portion of the rule.  in the RunAs portion of the rule.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 169 
Line 169 
 bgpd(8) did not correctly prepend its own AS to very long AS paths, causing  bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
 the process to terminate because of the resulting corrupt path.  the process to terminate because of the resulting corrupt path.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 181 
Line 181 
 sessions.  sessions.
 In the worst case Internet connectivity could be lost.  In the worst case Internet connectivity could be lost.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 192 
Line 192 
 signatures.  signatures.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 205 
Line 205 
 certificate.  certificate.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 215 
Line 215 
 DHCP clients such as Solaris/OpenSolaris and some embedded routers not  DHCP clients such as Solaris/OpenSolaris and some embedded routers not
 accepting DHCP offers.  accepting DHCP offers.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 224 
Line 224 
 A software bug could cause memory allocation to cause a kernel panic  A software bug could cause memory allocation to cause a kernel panic
 accessing an array out of its bounds, when physical memory is exhausted.  accessing an array out of its bounds, when physical memory is exhausted.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 236 
Line 236 
 will result in child processes crashing when utilizing proxy rules during an  will result in child processes crashing when utilizing proxy rules during an
 HTTP session.  HTTP session.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 246 
Line 246 
 can result in TCP connections between two IPs being reset instead of accepted  can result in TCP connections between two IPs being reset instead of accepted
 if being received on a socket in the TIME_WAIT state.  if being received on a socket in the TIME_WAIT state.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 255 
Line 255 
 Due to a bug in the vr(4) driver it is possible for a system using the vr(4)  Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
 driver to panic under heavy load if the RX path runs out of mbufs.  driver to panic under heavy load if the RX path runs out of mbufs.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 267 
Line 267 
 this vulnerability to be exploited.  this vulnerability to be exploited.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   

Legend:
Removed from v.1.26  
changed lines
  Added in v.1.27