version 1.44, 2016/08/15 02:22:06 |
version 1.45, 2016/10/16 19:11:30 |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
<p> |
<p> |
|
|
Insufficient protection of the trunk interface queues may cause |
Insufficient protection of the trunk interface queues may cause |
LACP trunks to fail under load. |
LACP trunks to fail under load. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/012_trunklacp.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Incorrectly initialized state updates can cause pfsync update storms. |
Incorrectly initialized state updates can cause pfsync update storms. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/011_pfsync.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
In TLS connections, certain incorrectly formatted records can cause |
In TLS connections, certain incorrectly formatted records can cause |
an OpenSSL client or server to crash due to a read attempt at NULL. |
an OpenSSL client or server to crash due to a read attempt at NULL. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/010_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
leading to a denial of service when a resource limit is apparently |
leading to a denial of service when a resource limit is apparently |
reached. |
reached. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/009_mpi.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
paranoid enough in checking for underruns, which could potentially |
paranoid enough in checking for underruns, which could potentially |
lead to crashes. |
lead to crashes. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
Due to a null pointer dereference, it would be possible to crash ftpd when |
Due to a null pointer dereference, it would be possible to crash ftpd when |
handling glob(3)'ing requests. This is non-exploitable. |
handling glob(3)'ing requests. This is non-exploitable. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/007_ftpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
OpenSSL is susceptible to a buffer overflow due to a failure |
OpenSSL is susceptible to a buffer overflow due to a failure |
to check for NULL returns from bn_wexpand function calls. |
to check for NULL returns from bn_wexpand function calls. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
could be created, violating assumptions in other parts of the kernel |
could be created, violating assumptions in other parts of the kernel |
and resulting in infinite loops. |
and resulting in infinite loops. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/005_ptrace.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
OpenSSL permitted this protocol feature by default and had no way to |
OpenSSL permitted this protocol feature by default and had no way to |
disable it. |
disable it. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
IP_IPCOMP_LEVEL will crash the system. |
IP_IPCOMP_LEVEL will crash the system. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/003_getsockopt.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
<i>i386 only</i><br> |
<i>i386 only</i><br> |
XMM exceptions are not correctly handled resulting in a kernel panic. |
XMM exceptions are not correctly handled resulting in a kernel panic. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/i386/002_xmm.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
An attacker could crash a server with a specially crafted dynamic update message to a |
An attacker could crash a server with a specially crafted dynamic update message to a |
zone for which the server is master. |
zone for which the server is master. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/001_bind.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|