[BACK]Return to errata44.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata44.html between version 1.55 and 1.56

version 1.55, 2016/08/15 02:22:06 version 1.56, 2016/10/16 19:11:30
Line 68 
Line 68 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 90 
Line 90 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/016_getsockopt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 99 
Line 99 
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/i386/015_xmm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 111 
Line 111 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/014_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 132 
Line 132 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/013_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 150 
Line 150 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/012_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 163 
Line 163 
 when the user being granted privileges is also a member of the group  when the user being granted privileges is also a member of the group
 in the RunAs portion of the rule.  in the RunAs portion of the rule.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/011_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 173 
Line 173 
 bgpd(8) did not correctly prepend its own AS to very long AS paths, causing  bgpd(8) did not correctly prepend its own AS to very long AS paths, causing
 the process to terminate because of the resulting corrupt path.  the process to terminate because of the resulting corrupt path.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/010_bgpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 186 
Line 186 
 sessions.  sessions.
 In the worst case Internet connectivity could be lost.  In the worst case Internet connectivity could be lost.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/009_bgpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 198 
Line 198 
 signatures.  signatures.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 212 
Line 212 
 certificate.  certificate.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 223 
Line 223 
 DHCP clients such as Solaris/OpenSolaris and some embedded routers not  DHCP clients such as Solaris/OpenSolaris and some embedded routers not
 accepting DHCP offers.  accepting DHCP offers.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/006_dhcpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 233 
Line 233 
 A software bug could cause memory allocation to cause a kernel panic  A software bug could cause memory allocation to cause a kernel panic
 accessing an array out of its bounds, when physical memory is exhausted.  accessing an array out of its bounds, when physical memory is exhausted.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/005_pglistalloc.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 246 
Line 246 
 will result in child processes crashing when utilizing proxy rules during an  will result in child processes crashing when utilizing proxy rules during an
 HTTP session.  HTTP session.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/004_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 257 
Line 257 
 can result in TCP connections between two IPs being reset instead of accepted  can result in TCP connections between two IPs being reset instead of accepted
 if being received on a socket in the TIME_WAIT state.  if being received on a socket in the TIME_WAIT state.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/003_tcpinput.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 267 
Line 267 
 Due to a bug in the vr(4) driver it is possible for a system using the vr(4)  Due to a bug in the vr(4) driver it is possible for a system using the vr(4)
 driver to panic under heavy load if the RX path runs out of mbufs.  driver to panic under heavy load if the RX path runs out of mbufs.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/002_vr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 280 
Line 280 
 this vulnerability to be exploited.  this vulnerability to be exploited.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2476">CVE-2008-2476</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/001_ndp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.55  
changed lines
  Added in v.1.56