[BACK]Return to errata46.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata46.html between version 1.53 and 1.54

version 1.53, 2019/04/02 12:46:57 version 1.54, 2019/05/27 22:55:20
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 4.6 Errata</title>  <title>OpenBSD 4.6 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata46.html">  <link rel="canonical" href="https://www.openbsd.org/errata46.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">4.6 Errata</font>  4.6 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 87 
Line 85 
   
 <ul>  <ul>
 <li id="p012_trunklacp">  <li id="p012_trunklacp">
 <font color="#009000"><strong>012: RELIABILITY FIX: May 14, 2010</strong></font>  <strong>012: RELIABILITY FIX: May 14, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient protection of the trunk interface queues may cause  Insufficient protection of the trunk interface queues may cause
 LACP trunks to fail under load.  LACP trunks to fail under load.
Line 97 
Line 95 
 <p>  <p>
   
 <li id="p011_pfsync">  <li id="p011_pfsync">
 <font color="#009000"><strong>011: RELIABILITY FIX: May 14, 2010</strong></font>  <strong>011: RELIABILITY FIX: May 14, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrectly initialized state updates can cause pfsync update storms.  Incorrectly initialized state updates can cause pfsync update storms.
 <br>  <br>
Line 106 
Line 104 
 <p>  <p>
   
 <li id="p010_openssl">  <li id="p010_openssl">
 <font color="#009000"><strong>010: SECURITY FIX: April 14, 2010</strong></font>  <strong>010: SECURITY FIX: April 14, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 In TLS connections, certain incorrectly formatted records can cause  In TLS connections, certain incorrectly formatted records can cause
 an OpenSSL client or server to crash due to a read attempt at NULL.  an OpenSSL client or server to crash due to a read attempt at NULL.
Line 116 
Line 114 
 <p>  <p>
   
 <li id="p009_mpi">  <li id="p009_mpi">
 <font color="#009000"><strong>009: RELIABILITY FIX: April 4, 2010</strong></font>  <strong>009: RELIABILITY FIX: April 4, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When updating sensors showing the state of RAID volumes  When updating sensors showing the state of RAID volumes
 <a href="https://man.openbsd.org/OpenBSD-4.6/mpi.4">mpi(4)</a>  <a href="https://man.openbsd.org/OpenBSD-4.6/mpi.4">mpi(4)</a>
Line 131 
Line 129 
 <p>  <p>
   
 <li id="p008_kerberos">  <li id="p008_kerberos">
 <font color="#009000"><strong>008: RELIABILITY FIX: March 31, 2010</strong></font>  <strong>008: RELIABILITY FIX: March 31, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 When decrypting packets, the internal decryption functions were not  When decrypting packets, the internal decryption functions were not
 paranoid enough in checking for underruns, which could potentially  paranoid enough in checking for underruns, which could potentially
Line 142 
Line 140 
 <p>  <p>
   
 <li id="p007_ftpd">  <li id="p007_ftpd">
 <font color="#009000"><strong>007: RELIABILITY FIX: March 12, 2010</strong></font>  <strong>007: RELIABILITY FIX: March 12, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a null pointer dereference, it would be possible to crash ftpd when  Due to a null pointer dereference, it would be possible to crash ftpd when
 handling glob(3)'ing requests. This is non-exploitable.  handling glob(3)'ing requests. This is non-exploitable.
Line 152 
Line 150 
 <p>  <p>
   
 <li id="p006_openssl">  <li id="p006_openssl">
 <font color="#009000"><strong>006: SECURITY FIX: March 12, 2010</strong></font>  <strong>006: SECURITY FIX: March 12, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenSSL is susceptible to a buffer overflow due to a failure  OpenSSL is susceptible to a buffer overflow due to a failure
 to check for NULL returns from bn_wexpand function calls.  to check for NULL returns from bn_wexpand function calls.
Line 162 
Line 160 
 <p>  <p>
   
 <li id="p005_ptrace">  <li id="p005_ptrace">
 <font color="#009000"><strong>005: RELIABILITY FIX: January 29, 2010</strong></font>  <strong>005: RELIABILITY FIX: January 29, 2010</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 By using ptrace(2) on an ancestor process, a loop in the process tree  By using ptrace(2) on an ancestor process, a loop in the process tree
 could be created, violating assumptions in other parts of the kernel  could be created, violating assumptions in other parts of the kernel
Line 173 
Line 171 
 <p>  <p>
   
 <li id="p004_openssl">  <li id="p004_openssl">
 <font color="#009000"><strong>004: SECURITY FIX: November 26, 2009</strong></font>  <strong>004: SECURITY FIX: November 26, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL/TLS protocol is subject to man-in-the-middle attacks related to  The SSL/TLS protocol is subject to man-in-the-middle attacks related to
 renegotiation (see CVE-2009-3555, draft-ietf-tls-renegotiation-00).  renegotiation (see CVE-2009-3555, draft-ietf-tls-renegotiation-00).
Line 185 
Line 183 
 <p>  <p>
   
 <li id="p003_getsockopt">  <li id="p003_getsockopt">
 <font color="#009000"><strong>003: RELIABILITY FIX: October 28, 2009</strong></font>  <strong>003: RELIABILITY FIX: October 28, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,  getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL,
 IP_IPCOMP_LEVEL will crash the system.  IP_IPCOMP_LEVEL will crash the system.
Line 195 
Line 193 
 <p>  <p>
   
 <li id="p002_xmm">  <li id="p002_xmm">
 <font color="#009000"><strong>002: RELIABILITY FIX: October 05, 2009</strong></font>  <strong>002: RELIABILITY FIX: October 05, 2009</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 XMM exceptions are not correctly handled resulting in a kernel panic.  XMM exceptions are not correctly handled resulting in a kernel panic.
 <br>  <br>
Line 204 
Line 202 
 <p>  <p>
   
 <li id="p001_bind">  <li id="p001_bind">
 <font color="#009000"><strong>001: RELIABILITY FIX: July 29, 2009</strong></font>  <strong>001: RELIABILITY FIX: July 29, 2009</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A vulnerability has been found in BIND's named server  A vulnerability has been found in BIND's named server
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</a>).  (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</a>).
Line 218 
Line 216 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.53  
changed lines
  Added in v.1.54