version 1.48, 2017/03/28 06:41:18 |
version 1.49, 2017/06/26 17:18:57 |
|
|
<li id="p002_vr"> |
<li id="p002_vr"> |
<font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font> |
<font color="#009000"><strong>002: RELIABILITY FIX: May 5, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A flaw exists in the <a href="http://man.openbsd.org/OpenBSD-5.3/vr.4" |
A flaw exists in the <a href="https://man.openbsd.org/OpenBSD-5.3/vr.4" |
>vr(4)</a> driver that may cause it to not recover from some error conditions. |
>vr(4)</a> driver that may cause it to not recover from some error conditions. |
|
|
<br> |
<br> |
|
|
<font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> |
<font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem exists in |
A problem exists in |
<a href="http://man.openbsd.org/OpenBSD-5.3/nginx.8">nginx(8)</a> |
<a href="https://man.openbsd.org/OpenBSD-5.3/nginx.8">nginx(8)</a> |
if proxy_pass is used with untrusted HTTP backend servers. |
if proxy_pass is used with untrusted HTTP backend servers. |
The problem may lead to a denial of service or a disclosure of a |
The problem may lead to a denial of service or a disclosure of a |
worker process memory on a specially crafted response from an |
worker process memory on a specially crafted response from an |
|
|
<li id="p007_vio"> |
<li id="p007_vio"> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> |
<font color="#009000"><strong>007: RELIABILITY FIX: June 12, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Two flaws in the <a href="http://man.openbsd.org/OpenBSD-5.3/vio.4">vio(4)</a> |
Two flaws in the <a href="https://man.openbsd.org/OpenBSD-5.3/vio.4">vio(4)</a> |
driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail |
driver may cause a kernel panic, and may cause IPv6 neighbour discovery to fail |
due to multicast receive problems.<br> |
due to multicast receive problems.<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/007_vio.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/007_vio.patch"> |
|
|
<font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font> |
<font color="#009000"><strong>008: RELIABILITY FIX: Nov 7, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A crash can happen on |
A crash can happen on |
<a href="http://man.openbsd.org/OpenBSD-5.3/pflow.4">pflow(4)</a> |
<a href="https://man.openbsd.org/OpenBSD-5.3/pflow.4">pflow(4)</a> |
interface destruction. |
interface destruction. |
|
|
<br> |
<br> |
|
|
<font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font> |
<font color="#009000"><strong>011: SECURITY FIX: Nov 21, 2013</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem exists in |
A problem exists in |
<a href="http://man.openbsd.org/OpenBSD-5.3/nginx.8">nginx(8)</a> |
<a href="https://man.openbsd.org/OpenBSD-5.3/nginx.8">nginx(8)</a> |
which might allow an attacker to bypass security restrictions in certain |
which might allow an attacker to bypass security restrictions in certain |
configurations by using a specially crafted request. |
configurations by using a specially crafted request. |
This issue was assigned CVE-2013-4547. |
This issue was assigned CVE-2013-4547. |