version 1.26, 2010/03/08 21:53:37 |
version 1.27, 2010/07/08 19:00:07 |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
|
|
|
|
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
IP_IPCOMP_LEVEL will crash the system. |
IP_IPCOMP_LEVEL will crash the system. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
<font color="#009000"><strong>015: RELIABILITY FIX: October 05, 2009</strong></font> <i>i386 only</i><br> |
<font color="#009000"><strong>015: RELIABILITY FIX: October 05, 2009</strong></font> <i>i386 only</i><br> |
XMM exceptions are not correctly handled resulting in a kernel panic. |
XMM exceptions are not correctly handled resulting in a kernel panic. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
An attacker could crash a server with a specially crafted dynamic update message to a |
An attacker could crash a server with a specially crafted dynamic update message to a |
zone for which the server is master. |
zone for which the server is master. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
<pre> |
<pre> |
nat/rdr ... inet6 proto { tcp udp icmp6 } ... |
nat/rdr ... inet6 proto { tcp udp icmp6 } ... |
</pre> |
</pre> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
<a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error |
<a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error |
Checking During CMS verification" relates to code not enabled in OpenBSD. |
Checking During CMS verification" relates to code not enabled in OpenBSD. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
when the user being granted privileges is also a member of the group |
when the user being granted privileges is also a member of the group |
in the RunAs portion of the rule. |
in the RunAs portion of the rule. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing |
bgpd(8) did not correctly prepend its own AS to very long AS paths, causing |
the process to terminate because of the resulting corrupt path. |
the process to terminate because of the resulting corrupt path. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
sessions. |
sessions. |
In the worst case Internet connectivity could be lost. |
In the worst case Internet connectivity could be lost. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
signatures. |
signatures. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
certificate. |
certificate. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
DHCP clients such as Solaris/OpenSolaris and some embedded routers not |
DHCP clients such as Solaris/OpenSolaris and some embedded routers not |
accepting DHCP offers. |
accepting DHCP offers. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
A software bug could cause memory allocation to cause a kernel panic |
A software bug could cause memory allocation to cause a kernel panic |
accessing an array out of its bounds, when physical memory is exhausted. |
accessing an array out of its bounds, when physical memory is exhausted. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
will result in child processes crashing when utilizing proxy rules during an |
will result in child processes crashing when utilizing proxy rules during an |
HTTP session. |
HTTP session. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
can result in TCP connections between two IPs being reset instead of accepted |
can result in TCP connections between two IPs being reset instead of accepted |
if being received on a socket in the TIME_WAIT state. |
if being received on a socket in the TIME_WAIT state. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
Due to a bug in the vr(4) driver it is possible for a system using the vr(4) |
Due to a bug in the vr(4) driver it is possible for a system using the vr(4) |
driver to panic under heavy load if the RX path runs out of mbufs. |
driver to panic under heavy load if the RX path runs out of mbufs. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|
|
|
this vulnerability to be exploited. |
this vulnerability to be exploited. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>. |
<br> |
<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch"> |
A source code patch exists which remedies this problem</a>.<br> |
A source code patch exists which remedies this problem</a>.<br> |
<p> |
<p> |
|
|