[BACK]Return to errata55.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata55.html between version 1.26 and 1.27

version 1.26, 2014/11/17 19:55:00 version 1.27, 2014/11/17 19:58:52
Line 220 
Line 220 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_pfctl"></a>  <li><a name="014_pfctl"></a>
 <font color="#009000"><strong>013: SECURITY FIX: November 17, 2014</strong></font>  <font color="#009000"><strong>014: RELIABILITY FIX: November 17, 2014</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 PF rules of the form "pass from {192.0.2.1 2001:db8::1} to (pppoe0)" will  A PF rule using an IPv4 address
 apply an incorrect /32 mask to the dynamic IPv6 address, allowing access to  followed by an IPv6 address and then a dynamic address, e.g. "pass
 a wide address range rather than the intended single host.  from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32
 As a workaround, list the IPv4 address last, i.e. "{2001:db8::1 192.0.2.1}".  mask applied to the dynamic address.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/013_pfctl.patch.sig">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/014_pfctl.patch.sig">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   <li><a name="015_asr"></a>
   <font color="#009000"><strong>015: RELIABILITY FIX: November 17, 2014</strong></font>
   &nbsp; <i>All architectures</i><br>
   Querying an invalid hostname with gethostbyname(3) could cause a NULL deref.
   <br>
   <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/015_asr.patch.sig">
   A source code patch exists which remedies this problem.</a>
   <p>
   
   
 </ul>  </ul>
   

Legend:
Removed from v.1.26  
changed lines
  Added in v.1.27