version 1.17, 2014/03/31 03:12:47 |
version 1.18, 2014/03/31 16:02:48 |
|
|
|
|
<ul> |
<ul> |
<li><a name="010_sis"></a> |
<li><a name="010_sis"></a> |
<font color="#009000"><strong>010: RELIABILITY FIX: February 16, 2011</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>010: RELIABILITY FIX: February 16, 2011</strong></font> |
|
<i>All architectures</i><br> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sis&sektion=4">sis(4)</a> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sis&sektion=4">sis(4)</a> |
driver may hand over stale ring descriptors to the hardware if the compiler decides |
driver may hand over stale ring descriptors to the hardware if the compiler decides |
to re-order stores or if the hardware does store-reordering. |
to re-order stores or if the hardware does store-reordering. |
|
|
<p> |
<p> |
|
|
<li><a name="009_pf"></a> |
<li><a name="009_pf"></a> |
<font color="#009000"><strong>009: SECURITY FIX: February 16, 2011</strong></font> <i>Little-endian |
<font color="#009000"><strong>009: SECURITY FIX: February 16, 2011</strong></font> |
|
<i>Little-endian |
architectures</i><br> |
architectures</i><br> |
PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were |
PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were |
not correctly handled on little-endian systems (alpha, amd64, arm, i386, |
not correctly handled on little-endian systems (alpha, amd64, arm, i386, |
|
|
<p> |
<p> |
|
|
<li><a name="008_openssl"></a> |
<li><a name="008_openssl"></a> |
<font color="#009000"><strong>008: SECURITY FIX: February 11, 2011</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>008: SECURITY FIX: February 11, 2011</strong></font> |
|
<i>All architectures</i><br> |
An incorrectly formatted ClientHello handshake message could cause |
An incorrectly formatted ClientHello handshake message could cause |
OpenSSL to parse past the end of the message. An attacker could use this flaw |
OpenSSL to parse past the end of the message. An attacker could use this flaw |
to trigger an invalid memory access, causing a crash of an application linked |
to trigger an invalid memory access, causing a crash of an application linked |
|
|
<p> |
<p> |
|
|
<li><a name="007_rtsock"></a> |
<li><a name="007_rtsock"></a> |
<font color="#009000"><strong>007: RELIABILITY FIX: January 13, 2011</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>007: RELIABILITY FIX: January 13, 2011</strong></font> |
|
<i>All architectures</i><br> |
sp_protocol in RTM_DELETE messages could contain garbage values |
sp_protocol in RTM_DELETE messages could contain garbage values |
leading to routing socket users that restrict the AF (such as ospfd) |
leading to routing socket users that restrict the AF (such as ospfd) |
not seeing any of the RTM_DELETE messages. |
not seeing any of the RTM_DELETE messages. |
|
|
<p> |
<p> |
|
|
<li><a name="006_cbc"></a> |
<li><a name="006_cbc"></a> |
<font color="#009000"><strong>006: RELIABILITY FIX: December 17, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>006: RELIABILITY FIX: December 17, 2010</strong></font> |
|
<i>All architectures</i><br> |
Bring CBC oracle attack countermeasures to hardware crypto accelerator land. |
Bring CBC oracle attack countermeasures to hardware crypto accelerator land. |
This fixes aes-ni, via xcrypt and various drivers |
This fixes aes-ni, via xcrypt and various drivers |
(<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glxsb&arch=i386&sektion=4">glxsb(4)</a>, |
(<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glxsb&arch=i386&sektion=4">glxsb(4)</a>, |
|
|
<p> |
<p> |
|
|
<li><a name="005_pf"></a> |
<li><a name="005_pf"></a> |
<font color="#009000"><strong>005: SECURITY FIX: December 17, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>005: SECURITY FIX: December 17, 2010</strong></font> |
|
<i>All architectures</i><br> |
Insufficent initialization of the pf rule structure in the ioctl |
Insufficent initialization of the pf rule structure in the ioctl |
handler may allow userland to modify kernel memory. By default root |
handler may allow userland to modify kernel memory. By default root |
privileges are needed to add or modify pf rules. |
privileges are needed to add or modify pf rules. |
|
|
<p> |
<p> |
|
|
<li><a name="004_openssl"></a> |
<li><a name="004_openssl"></a> |
<font color="#009000"><strong>004: RELIABILITY FIX: November 17, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>004: RELIABILITY FIX: November 17, 2010</strong></font> |
|
<i>All architectures</i><br> |
Fix a flaw in the OpenSSL TLS server extension code parsing which could lead to |
Fix a flaw in the OpenSSL TLS server extension code parsing which could lead to |
a buffer overflow. This affects OpenSSL based TLS servers which are multi-threaded |
a buffer overflow. This affects OpenSSL based TLS servers which are multi-threaded |
and use OpenSSL's internal caching mechanism. Servers that are multi-process |
and use OpenSSL's internal caching mechanism. Servers that are multi-process |
|
|
<p> |
<p> |
|
|
<li><a name="003_vr"></a> |
<li><a name="003_vr"></a> |
<font color="#009000"><strong>003: RELIABILITY FIX: November 16, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>003: RELIABILITY FIX: November 16, 2010</strong></font> |
|
<i>All architectures</i><br> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4">vr(4)</a> |
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4">vr(4)</a> |
driver may hand over stale ring descriptors to the hardware if the compiler decides |
driver may hand over stale ring descriptors to the hardware if the compiler decides |
to re-order stores or if the hardware does store-reordering. |
to re-order stores or if the hardware does store-reordering. |
|
|
<p> |
<p> |
|
|
<li><a name="002_pci"></a> |
<li><a name="002_pci"></a> |
<font color="#009000"><strong>002: RELIABILITY FIX: November 16, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>002: RELIABILITY FIX: November 16, 2010</strong></font> |
|
<i>All architectures</i><br> |
Certain PCI based hardware may improperly announce their Base Address |
Certain PCI based hardware may improperly announce their Base Address |
Registers as prefetchable even though they are not. This may cause |
Registers as prefetchable even though they are not. This may cause |
unpredictable effects due to wrongly mapped memory. |
unpredictable effects due to wrongly mapped memory. |
|
|
<p> |
<p> |
|
|
<li><a name="001_bgpd"></a> |
<li><a name="001_bgpd"></a> |
<font color="#009000"><strong>001: RELIABILITY FIX: November 16, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>001: RELIABILITY FIX: November 16, 2010</strong></font> |
|
<i>All architectures</i><br> |
Uninitialized memory may force the RDE into route-collector mode on startup and |
Uninitialized memory may force the RDE into route-collector mode on startup and |
may prevent bgpd from updating or announcing any routes. |
may prevent bgpd from updating or announcing any routes. |
<br> |
<br> |