[BACK]Return to errata48.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata48.html between version 1.17 and 1.18

version 1.17, 2014/03/31 03:12:47 version 1.18, 2014/03/31 16:02:48
Line 77 
Line 77 
   
 <ul>  <ul>
 <li><a name="010_sis"></a>  <li><a name="010_sis"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: February 16, 2011</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: February 16, 2011</strong></font>
   &nbsp; <i>All architectures</i><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sis&sektion=4">sis(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sis&sektion=4">sis(4)</a>
 driver may hand over stale ring descriptors to the hardware if the compiler decides  driver may hand over stale ring descriptors to the hardware if the compiler decides
 to re-order stores or if the hardware does store-reordering.  to re-order stores or if the hardware does store-reordering.
Line 87 
Line 88 
 <p>  <p>
   
 <li><a name="009_pf"></a>  <li><a name="009_pf"></a>
 <font color="#009000"><strong>009: SECURITY FIX: February 16, 2011</strong></font> &nbsp; <i>Little-endian  <font color="#009000"><strong>009: SECURITY FIX: February 16, 2011</strong></font>
   &nbsp; <i>Little-endian
  architectures</i><br>   architectures</i><br>
 PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were  PF rules specifying address ranges (e.g. "10.1.1.1 - 10.1.1.5") were
 not correctly handled on little-endian systems (alpha, amd64, arm, i386,  not correctly handled on little-endian systems (alpha, amd64, arm, i386,
Line 99 
Line 101 
 <p>  <p>
   
 <li><a name="008_openssl"></a>  <li><a name="008_openssl"></a>
 <font color="#009000"><strong>008: SECURITY FIX: February 11, 2011</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: SECURITY FIX: February 11, 2011</strong></font>
   &nbsp; <i>All architectures</i><br>
 An incorrectly formatted ClientHello handshake message could cause  An incorrectly formatted ClientHello handshake message could cause
 OpenSSL to parse past the end of the message.  An attacker could use this flaw  OpenSSL to parse past the end of the message.  An attacker could use this flaw
 to trigger an invalid memory access, causing a crash of an application linked  to trigger an invalid memory access, causing a crash of an application linked
Line 116 
Line 119 
 <p>  <p>
   
 <li><a name="007_rtsock"></a>  <li><a name="007_rtsock"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: January 13, 2011</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: January 13, 2011</strong></font>
   &nbsp; <i>All architectures</i><br>
 sp_protocol in RTM_DELETE messages could contain garbage values  sp_protocol in RTM_DELETE messages could contain garbage values
 leading to routing socket users that restrict the AF (such as ospfd)  leading to routing socket users that restrict the AF (such as ospfd)
 not seeing any of the RTM_DELETE messages.  not seeing any of the RTM_DELETE messages.
Line 126 
Line 130 
 <p>  <p>
   
 <li><a name="006_cbc"></a>  <li><a name="006_cbc"></a>
 <font color="#009000"><strong>006: RELIABILITY FIX: December 17, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>006: RELIABILITY FIX: December 17, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 Bring CBC oracle attack countermeasures to hardware crypto accelerator land.  Bring CBC oracle attack countermeasures to hardware crypto accelerator land.
 This fixes aes-ni, via xcrypt and various drivers  This fixes aes-ni, via xcrypt and various drivers
 (<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glxsb&arch=i386&sektion=4">glxsb(4)</a>,  (<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glxsb&arch=i386&sektion=4">glxsb(4)</a>,
Line 140 
Line 145 
 <p>  <p>
   
 <li><a name="005_pf"></a>  <li><a name="005_pf"></a>
 <font color="#009000"><strong>005: SECURITY FIX: December 17, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: SECURITY FIX: December 17, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 Insufficent initialization of the pf rule structure in the ioctl  Insufficent initialization of the pf rule structure in the ioctl
 handler may allow userland to modify kernel memory. By default root  handler may allow userland to modify kernel memory. By default root
 privileges are needed to add or modify pf rules.  privileges are needed to add or modify pf rules.
Line 150 
Line 156 
 <p>  <p>
   
 <li><a name="004_openssl"></a>  <li><a name="004_openssl"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: November 17, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: November 17, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 Fix a flaw in the OpenSSL TLS server extension code parsing which could lead to  Fix a flaw in the OpenSSL TLS server extension code parsing which could lead to
 a buffer overflow. This affects OpenSSL based TLS servers which are multi-threaded  a buffer overflow. This affects OpenSSL based TLS servers which are multi-threaded
 and use OpenSSL's internal caching mechanism. Servers that are multi-process  and use OpenSSL's internal caching mechanism. Servers that are multi-process
Line 161 
Line 168 
 <p>  <p>
   
 <li><a name="003_vr"></a>  <li><a name="003_vr"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: November 16, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>003: RELIABILITY FIX: November 16, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4">vr(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4">vr(4)</a>
 driver may hand over stale ring descriptors to the hardware if the compiler decides  driver may hand over stale ring descriptors to the hardware if the compiler decides
 to re-order stores or if the hardware does store-reordering.  to re-order stores or if the hardware does store-reordering.
Line 171 
Line 179 
 <p>  <p>
   
 <li><a name="002_pci"></a>  <li><a name="002_pci"></a>
 <font color="#009000"><strong>002: RELIABILITY FIX: November 16, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: RELIABILITY FIX: November 16, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 Certain PCI based hardware may improperly announce their Base Address  Certain PCI based hardware may improperly announce their Base Address
 Registers as prefetchable even though they are not. This may cause  Registers as prefetchable even though they are not. This may cause
 unpredictable effects due to wrongly mapped memory.  unpredictable effects due to wrongly mapped memory.
Line 181 
Line 190 
 <p>  <p>
   
 <li><a name="001_bgpd"></a>  <li><a name="001_bgpd"></a>
 <font color="#009000"><strong>001: RELIABILITY FIX: November 16, 2010</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: RELIABILITY FIX: November 16, 2010</strong></font>
   &nbsp; <i>All architectures</i><br>
 Uninitialized memory may force the RDE into route-collector mode on startup and  Uninitialized memory may force the RDE into route-collector mode on startup and
 may prevent bgpd from updating or announcing any routes.  may prevent bgpd from updating or announcing any routes.
 <br>  <br>

Legend:
Removed from v.1.17  
changed lines
  Added in v.1.18