[BACK]Return to errata46.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata46.html between version 1.44 and 1.45

version 1.44, 2016/08/15 02:22:06 version 1.45, 2016/10/16 19:11:30
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 92 
Line 92 
 Insufficient protection of the trunk interface queues may cause  Insufficient protection of the trunk interface queues may cause
 LACP trunks to fail under load.  LACP trunks to fail under load.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 101 
Line 101 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrectly initialized state updates can cause pfsync update storms.  Incorrectly initialized state updates can cause pfsync update storms.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 111 
Line 111 
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
 an OpenSSL client or server to crash due to a read attempt at NULL.  an OpenSSL client or server to crash due to a read attempt at NULL.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 126 
Line 126 
 leading to a denial of service when a resource limit is apparently  leading to a denial of service when a resource limit is apparently
 reached.  reached.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 137 
Line 137 
 paranoid enough in checking for underruns, which could potentially  paranoid enough in checking for underruns, which could potentially
 lead to crashes.  lead to crashes.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 147 
Line 147 
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
 handling glob(3)'ing requests. This is non-exploitable.  handling glob(3)'ing requests. This is non-exploitable.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 157 
Line 157 
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
 to check for NULL returns from bn_wexpand function calls.  to check for NULL returns from bn_wexpand function calls.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 168 
Line 168 
 could be created, violating assumptions in other parts of the kernel  could be created, violating assumptions in other parts of the kernel
 and resulting in infinite loops.  and resulting in infinite loops.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 180 
Line 180 
 OpenSSL permitted this protocol feature by default and had no way to  OpenSSL permitted this protocol feature by default and had no way to
 disable it.  disable it.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 190 
Line 190 
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 199 
Line 199 
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
Line 211 
Line 211 
 An attacker could crash a server with a specially crafted dynamic update message to a  An attacker could crash a server with a specially crafted dynamic update message to a
 zone for which the server is master.  zone for which the server is master.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   

Legend:
Removed from v.1.44  
changed lines
  Added in v.1.45