[BACK]Return to errata45.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata45.html between version 1.52 and 1.53

version 1.52, 2016/08/15 02:22:06 version 1.53, 2016/10/16 19:11:30
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 92 
Line 92 
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
 an OpenSSL client or server to crash due to a read attempt at NULL.  an OpenSSL client or server to crash due to a read attempt at NULL.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/016_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/016_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 107 
Line 107 
 leading to a denial of service when a resource limit is apparently  leading to a denial of service when a resource limit is apparently
 reached.  reached.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/015_mpi.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/015_mpi.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 118 
Line 118 
 paranoid enough in checking for underruns, which could potentially  paranoid enough in checking for underruns, which could potentially
 lead to crashes.  lead to crashes.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/014_kerberos.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/014_kerberos.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 128 
Line 128 
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
 handling glob(3)'ing requests. This is non-exploitable.  handling glob(3)'ing requests. This is non-exploitable.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/013_ftpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/013_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 138 
Line 138 
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
 to check for NULL returns from bn_wexpand function calls.  to check for NULL returns from bn_wexpand function calls.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/012_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/012_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 149 
Line 149 
 could be created, violating assumptions in other parts of the kernel  could be created, violating assumptions in other parts of the kernel
 and resulting in infinite loops.  and resulting in infinite loops.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/011_ptrace.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/011_ptrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 161 
Line 161 
 OpenSSL permitted this protocol feature by default and had no way to  OpenSSL permitted this protocol feature by default and had no way to
 disable it.  disable it.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/010_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/010_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 171 
Line 171 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/009_getsockopt.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/009_getsockopt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 180 
Line 180 
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/008_xmm.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/008_xmm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 192 
Line 192 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/007_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/007_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 206 
Line 206 
 (hang or crash) via a crafted zlib compressed stream that  (hang or crash) via a crafted zlib compressed stream that
 triggers a heap-based buffer overflow.  triggers a heap-based buffer overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/006_perl_zlib.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/006_perl_zlib.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 221 
Line 221 
 driver causing the audio application to go out of sync, and in turn causing  driver causing the audio application to go out of sync, and in turn causing
 continuous stuttering until the application is restarted.  continuous stuttering until the application is restarted.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/005_audio.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/005_audio.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 234 
Line 234 
 to think that buffer underruns are occuring.  Depending on the  to think that buffer underruns are occuring.  Depending on the
 application, this may cause the sound to stutter.  application, this may cause the sound to stutter.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/004_aucat.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/004_aucat.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 248 
Line 248 
 to stutter, but other anomalies might be observed for other  to stutter, but other anomalies might be observed for other
 device types.  device types.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/003_bus_dma.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/i386/003_bus_dma.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 269 
Line 269 
 <pre>  <pre>
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...      nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 </pre>  </pre>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/002_pf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/002_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 287 
Line 287 
 <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error  <a href="http://www.openssl.org/news/secadv_20090325.txt">OpenSSL security advisory</a>, but note that the other issue described there "Incorrect Error
 Checking During CMS verification" relates to code not enabled in OpenBSD.  Checking During CMS verification" relates to code not enabled in OpenBSD.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/001_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/001_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.52  
changed lines
  Added in v.1.53