[BACK]Return to errata46.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata46.html between version 1.16 and 1.17

version 1.16, 2010/06/08 01:49:35 version 1.17, 2010/07/08 19:00:07
Line 53 
Line 53 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 91 
Line 91 
 Insufficient protection of the trunk interface queues may cause  Insufficient protection of the trunk interface queues may cause
 LACP trunks to fail under load.  LACP trunks to fail under load.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 99 
Line 99 
 <font color="#009000"><strong>011: RELIABILITY FIX: May 14, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: RELIABILITY FIX: May 14, 2010</strong></font> &nbsp; <i>All architectures</i><br>
 Incorrectly initialized state updates can cause pfsync update storms.  Incorrectly initialized state updates can cause pfsync update storms.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 108 
Line 108 
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
 an OpenSSL client or server to crash due to a read attempt at NULL.  an OpenSSL client or server to crash due to a read attempt at NULL.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 122 
Line 122 
 leading to a denial of service when a resource limit is apparently  leading to a denial of service when a resource limit is apparently
 reached.  reached.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 132 
Line 132 
 paranoid enough in checking for underruns, which could potentially  paranoid enough in checking for underruns, which could potentially
 lead to crashes.  lead to crashes.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 141 
Line 141 
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
 handling glob(3)'ing requests. This is non-exploitable.  handling glob(3)'ing requests. This is non-exploitable.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 150 
Line 150 
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
 to check for NULL returns from bn_wexpand function calls.  to check for NULL returns from bn_wexpand function calls.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 160 
Line 160 
 could be created, violating assumptions in other parts of the kernel  could be created, violating assumptions in other parts of the kernel
 and resulting in infinite loops.  and resulting in infinite loops.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 171 
Line 171 
 OpenSSL permitted this protocol feature by default and had no way to  OpenSSL permitted this protocol feature by default and had no way to
 disable it.  disable it.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 180 
Line 180 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 188 
Line 188 
 <font color="#009000"><strong>002: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>  <font color="#009000"><strong>002: RELIABILITY FIX: October 05, 2009</strong></font> &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
   
Line 199 
Line 199 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem</a>.<br>
 <p>  <p>
 </ul>  </ul>

Legend:
Removed from v.1.16  
changed lines
  Added in v.1.17