[BACK]Return to errata45.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata45.html between version 1.24 and 1.25

version 1.24, 2010/06/08 01:49:35 version 1.25, 2010/07/08 19:00:07
Line 53 
Line 53 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 91 
Line 91 
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
 an OpenSSL client or server to crash due to a read attempt at NULL.  an OpenSSL client or server to crash due to a read attempt at NULL.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/016_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/016_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 105 
Line 105 
 leading to a denial of service when a resource limit is apparently  leading to a denial of service when a resource limit is apparently
 reached.  reached.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/015_mpi.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/015_mpi.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 115 
Line 115 
 paranoid enough in checking for underruns, which could potentially  paranoid enough in checking for underruns, which could potentially
 lead to crashes.  lead to crashes.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/014_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/014_kerberos.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 124 
Line 124 
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
 handling glob(3)'ing requests. This is non-exploitable.  handling glob(3)'ing requests. This is non-exploitable.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/013_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/013_ftpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 133 
Line 133 
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
 to check for NULL returns from bn_wexpand function calls.  to check for NULL returns from bn_wexpand function calls.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/012_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/012_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 143 
Line 143 
 could be created, violating assumptions in other parts of the kernel  could be created, violating assumptions in other parts of the kernel
 and resulting in infinite loops.  and resulting in infinite loops.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/011_ptrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/011_ptrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 154 
Line 154 
 OpenSSL permitted this protocol feature by default and had no way to  OpenSSL permitted this protocol feature by default and had no way to
 disable it.  disable it.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/010_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/010_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 163 
Line 163 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/009_getsockopt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/009_getsockopt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 171 
Line 171 
 <font color="#009000"><strong>008: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>  <font color="#009000"><strong>008: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/008_xmm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/008_xmm.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 182 
Line 182 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/007_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/007_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 195 
Line 195 
 (hang or crash) via a crafted zlib compressed stream that  (hang or crash) via a crafted zlib compressed stream that
 triggers a heap-based buffer overflow.  triggers a heap-based buffer overflow.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/006_perl_zlib.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/006_perl_zlib.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 209 
Line 209 
 driver causing the audio application to go out of sync, and in turn causing  driver causing the audio application to go out of sync, and in turn causing
 continuous stuttering until the application is restarted.  continuous stuttering until the application is restarted.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/005_audio.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/005_audio.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 221 
Line 221 
 to think that buffer underruns are occuring.  Depending on the  to think that buffer underruns are occuring.  Depending on the
 application, this may cause the sound to stutter.  application, this may cause the sound to stutter.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/004_aucat.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/004_aucat.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 234 
Line 234 
 to stutter, but other anomalies might be observed for other  to stutter, but other anomalies might be observed for other
 device types.  device types.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/003_bus_dma.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/003_bus_dma.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 254 
Line 254 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/002_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/002_pf.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 271 
Line 271 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/001_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/001_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   

Legend:
Removed from v.1.24  
changed lines
  Added in v.1.25