[BACK]Return to errata53.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata53.html between version 1.23 and 1.24

version 1.23, 2014/03/31 03:12:47 version 1.24, 2014/03/31 16:02:48
Line 77 
Line 77 
   
 <ul>  <ul>
 <li><a name="001_bgpd"></a>  <li><a name="001_bgpd"></a>
 <font color="#009000"><strong>001: RELIABILITY FIX: March 15, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>001: RELIABILITY FIX: March 15, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A rare condition during session startup may cause bgpd to replace  A rare condition during session startup may cause bgpd to replace
 an active session leading to unknown consequences.  Bug found by  an active session leading to unknown consequences.  Bug found by
 inspection (we do not know how to reproduce it, consider that a challenge).  inspection (we do not know how to reproduce it, consider that a challenge).
Line 88 
Line 89 
 <p>  <p>
   
 <li><a name="002_vr"></a>  <li><a name="002_vr"></a>
 <font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A flaw exists in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4"  A flaw exists in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4"
 >vr(4)</a> driver that may cause it to not recover from some error conditions.  >vr(4)</a> driver that may cause it to not recover from some error conditions.
   
Line 98 
Line 100 
 <p>  <p>
   
 <li><a name="003_nginx"></a>  <li><a name="003_nginx"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A problem exists in  A problem exists in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a>
 if proxy_pass is used with untrusted HTTP backend servers.  if proxy_pass is used with untrusted HTTP backend servers.
Line 112 
Line 115 
 <p>  <p>
   
 <li><a name="004_route"></a>  <li><a name="004_route"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: May 17, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: May 17, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 As discovered by Peter Philipp, it is possible for an unprivileged user  As discovered by Peter Philipp, it is possible for an unprivileged user
 process to trigger deleting the undeletable RNF_ROOT route, resulting in  process to trigger deleting the undeletable RNF_ROOT route, resulting in
 a kernel panic.  a kernel panic.
Line 123 
Line 127 
 <p>  <p>
   
 <li><a name="005_in6"></a>  <li><a name="005_in6"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: May 31, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: RELIABILITY FIX: May 31, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A local denial of service is possible by an unprivileged user if the  A local denial of service is possible by an unprivileged user if the
 SIOCSIFADDR ioctl is performed upon an AF_INET6 socket with a specially  SIOCSIFADDR ioctl is performed upon an AF_INET6 socket with a specially
 crafted parameter.  crafted parameter.
Line 133 
Line 138 
 <p>  <p>
   
 <li><a name="006_tftpd"></a>  <li><a name="006_tftpd"></a>
 <font color="#009000"><strong>006: RELIABILITY FIX: June 12, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>006: RELIABILITY FIX: June 12, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A denial of services was discovered where certain combinations of  A denial of services was discovered where certain combinations of
 TFTP options could cause OACK generation to fail, which in turn  TFTP options could cause OACK generation to fail, which in turn
 caused a double free in tftpd.  caused a double free in tftpd.
Line 143 
Line 149 
 <p>  <p>
   
 <li><a name="007_vio"></a>  <li><a name="007_vio"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 Two flaws in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vio&sektion=4">vio(4)</a>  Two flaws in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vio&sektion=4">vio(4)</a>
 driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail  driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail
 due to multicast receive problems.<br>  due to multicast receive problems.<br>
Line 152 
Line 159 
 <p>  <p>
   
 <li><a name="008_pflow"></a>  <li><a name="008_pflow"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A crash can happen on pflow(4) interface destruction.  A crash can happen on pflow(4) interface destruction.
   
 <br>  <br>
Line 161 
Line 169 
 <p>  <p>
   
 <li><a name="009_sshgcm"></a>  <li><a name="009_sshgcm"></a>
 <font color="#009000"><strong>009: SECURITY FIX: Nov 7, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: Nov 7, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A memory corruption vulnerability exists in the post-authentication sshd process  A memory corruption vulnerability exists in the post-authentication sshd process
 when an AES-GCM cipher (aes128-gcm@openssh.com or aes256-gcm@openssh.com) is  when an AES-GCM cipher (aes128-gcm@openssh.com or aes256-gcm@openssh.com) is
 selected during kex exchange.  selected during kex exchange.
Line 175 
Line 184 
   
   
 <li><a name="010_vnode"></a>  <li><a name="010_vnode"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: Nov 11, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: Nov 11, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 An unprivileged user may hang the system.  An unprivileged user may hang the system.
   
 <br>  <br>
Line 184 
Line 194 
 <p>  <p>
   
 <li><a name="011_nginx"></a>  <li><a name="011_nginx"></a>
 <font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font>
   &nbsp; <i>All architectures</i><br>
 A problem exists in  A problem exists in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a>
 which might allow an attacker to bypass security restrictions in certain  which might allow an attacker to bypass security restrictions in certain
Line 196 
Line 207 
 <p>  <p>
   
 <li><a name="012_sha512"></a>  <li><a name="012_sha512"></a>
 <font color="#009000"><strong>012: RELIABILITY FIX: Dec 19, 2013</strong></font> &nbsp; <i>Strict alignment architectures</i><br>  <font color="#009000"><strong>012: RELIABILITY FIX: Dec 19, 2013</strong></font>
   &nbsp; <i>Strict alignment architectures</i><br>
 In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of  In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of
 the application.  The i386, amd64, vax and m68k platforms aren't  the application.  The i386, amd64, vax and m68k platforms aren't
 affected.  affected.
Line 206 
Line 218 
 <p>  <p>
   
 <li><a name="013_libXfont"></a>  <li><a name="013_libXfont"></a>
 <font color="#009000"><strong>013: SECURITY FIX: Jan 10, 2014</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: SECURITY FIX: Jan 10, 2014</strong></font>
   &nbsp; <i>All architectures</i><br>
 A BDF font file containing a longer than expected string could overflow  A BDF font file containing a longer than expected string could overflow
 a buffer on the stack in the X server.  a buffer on the stack in the X server.
 This issue was assigned CVE-2013-6462.  This issue was assigned CVE-2013-6462.

Legend:
Removed from v.1.23  
changed lines
  Added in v.1.24