version 1.38, 2016/02/20 14:18:42 |
version 1.39, 2016/03/21 05:46:20 |
|
|
<li id="002_vr"> |
<li id="002_vr"> |
<font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font> |
<font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A flaw exists in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vr&sektion=4" |
A flaw exists in the <a href="http://man.openbsd.org?query=vr&sektion=4" |
>vr(4)</a> driver that may cause it to not recover from some error conditions. |
>vr(4)</a> driver that may cause it to not recover from some error conditions. |
|
|
<br> |
<br> |
|
|
<font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> |
<font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem exists in |
A problem exists in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a> |
<a href="http://man.openbsd.org?query=nginx&sektion=8">nginx(8)</a> |
if proxy_pass is used with untrusted HTTP backend servers. |
if proxy_pass is used with untrusted HTTP backend servers. |
The problem may lead to a denial of service or a disclosure of a |
The problem may lead to a denial of service or a disclosure of a |
worker process memory on a specially crafted response from an |
worker process memory on a specially crafted response from an |
|
|
<li id="007_vio"> |
<li id="007_vio"> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Two flaws in the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vio&sektion=4">vio(4)</a> |
Two flaws in the <a href="http://man.openbsd.org?query=vio&sektion=4">vio(4)</a> |
driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail |
driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail |
due to multicast receive problems.<br> |
due to multicast receive problems.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/007_vio.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/007_vio.patch"> |
|
|
<font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font> |
<font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A crash can happen on |
A crash can happen on |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pflow&manpath=OpenBSD+5.3&sektion=4">pflow(4)</a> |
<a href="http://man.openbsd.org?query=pflow&manpath=OpenBSD+5.3&sektion=4">pflow(4)</a> |
interface destruction. |
interface destruction. |
|
|
<br> |
<br> |
|
|
<font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font> |
<font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem exists in |
A problem exists in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a> |
<a href="http://man.openbsd.org?query=nginx&sektion=8">nginx(8)</a> |
which might allow an attacker to bypass security restrictions in certain |
which might allow an attacker to bypass security restrictions in certain |
configurations by using a specially crafted request. |
configurations by using a specially crafted request. |
This issue was assigned CVE-2013-4547. |
This issue was assigned CVE-2013-4547. |