version 1.7, 2014/11/17 19:55:00 |
version 1.8, 2014/11/17 19:58:52 |
|
|
<p> |
<p> |
|
|
<li><a name="007_pfctl"></a> |
<li><a name="007_pfctl"></a> |
<font color="#009000"><strong>007: SECURITY FIX: November 17, 2014</strong></font> |
<font color="#009000"><strong>007: RELIABILITY FIX: November 17, 2014</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
PF rules of the form "pass from {192.0.2.1 2001:db8::1} to (pppoe0)" will |
A PF rule using an IPv4 address |
apply an incorrect /32 mask to the dynamic IPv6 address, allowing access to |
followed by an IPv6 address and then a dynamic address, e.g. "pass |
a wide address range rather than the intended single host. |
from {192.0.2.1 2001:db8::1} to (pppoe0)", will have an incorrect /32 |
As a workaround, list the IPv4 address last, i.e. "{2001:db8::1 192.0.2.1}". |
mask applied to the dynamic address. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/007_pfctl.patch.sig"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/007_pfctl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li><a name="008_asr"></a> |
|
<font color="#009000"><strong>008: RELIABILITY FIX: November 17, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
Querying an invalid hostname with gethostbyname(3) could cause a NULL deref. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/008_asr.patch.sig"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|