version 1.4, 2007/03/08 17:58:54 |
version 1.5, 2007/03/13 01:44:49 |
|
|
<li>Various binutils and <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gcc&sektion=1&format=html">gcc(1)</a> additions to handle 32-bit SuperH cpus. |
<li>Various binutils and <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gcc&sektion=1&format=html">gcc(1)</a> additions to handle 32-bit SuperH cpus. |
<li>In <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf.conf&sektion=5&format=html">pf.conf(5)</a>, make 'flags S/SA keep state' the implicit default for filter rules. |
<li>In <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf.conf&sektion=5&format=html">pf.conf(5)</a>, make 'flags S/SA keep state' the implicit default for filter rules. |
<!-- 2006/10/05 --> |
<!-- 2006/10/05 --> |
<li><font color="#e00000"><strong>SECURITY FIX: Integer overflow in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&sektion=4">systrace(4)</a>'s STRIOCREPLACE support. This could be exploited for DoS, limited kmem reads or local privilege escalation.</strong></font><br><a href="errata.html#systrace">A source code patch is available</a>.<br><a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> |
<li><font color="#e00000"><strong>SECURITY FIX: Integer overflow in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&sektion=4">systrace(4)</a>'s STRIOCREPLACE support. This could be exploited for DoS, limited kmem reads or local privilege escalation.</strong></font><br><a href="errata40.html#systrace">A source code patch is available</a>.<br><a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> |
<li>Update OpenSSH to 4.4. |
<li>Update OpenSSH to 4.4. |
<li>Always allow read-only opens on (s)vnd devices, despite the type of the first open (svnd vs vnd). |
<li>Always allow read-only opens on (s)vnd devices, despite the type of the first open (svnd vs vnd). |
<!-- 2006/10/04 --> |
<!-- 2006/10/04 --> |
|
|
<li>Fix for <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=write&sektion=1&format=html">write(1)</a> to handle cases where the utmp file is missing. |
<li>Fix for <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=write&sektion=1&format=html">write(1)</a> to handle cases where the utmp file is missing. |
<li>Fixes for <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pci&sektion=4&format=html">pci(4)</a> where unit numbers do not match PCI Bus number. |
<li>Fixes for <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pci&sektion=4&format=html">pci(4)</a> where unit numbers do not match PCI Bus number. |
<li><font color="#e00000"><strong>SECURITY FIX: Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 structures an error condition is mishandled, possibly resulting in an infinite loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL pointer may be dereferenced in the SSL version 2 client code. In addition, many applications using OpenSSL do not perform any validation of the lengths of public keys being used.</strong></font><br> |
<li><font color="#e00000"><strong>SECURITY FIX: Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 structures an error condition is mishandled, possibly resulting in an infinite loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL pointer may be dereferenced in the SSL version 2 client code. In addition, many applications using OpenSSL do not perform any validation of the lengths of public keys being used.</strong></font><br> |
<a href="errata.html#openssl2">A source code patch is available</a>.<br> |
<a href="errata40.html#openssl2">A source code patch is available</a>.<br> |
<a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> |
<a href="stable.html"><font color="#00b000">[Applied to stable]</font></a> |
<!-- 2006/10/03 --> |
<!-- 2006/10/03 --> |
<li>Use 64 bit daddr type for physical block numbers in the filesystem code. |
<li>Use 64 bit daddr type for physical block numbers in the filesystem code. |