version 1.581, 2006/12/10 21:45:25 |
version 1.582, 2007/01/03 21:14:39 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<a name="alpha"></a> |
<a name="alpha"></a> |
<a name="amd64"></a> |
<a name="amd64"></a> |
|
<a name="armish"></a> |
<a name="cats"></a> |
<a name="cats"></a> |
<a name="hp300"></a> |
<a name="hp300"></a> |
<a name="hppa"></a> |
<a name="hppa"></a> |
<a name="i386"></a> |
<a name="i386"></a> |
|
<a name="luna88k"></a> |
<a name="mac68k"></a> |
<a name="mac68k"></a> |
<a name="macppc"></a> |
<a name="macppc"></a> |
<a name="mvme68k"></a> |
<a name="mvme68k"></a> |
<a name="mvme88k"></a> |
<a name="mvme88k"></a> |
|
<a name="sgi"></a> |
<a name="sparc"></a> |
<a name="sparc"></a> |
<a name="sparc64"></a> |
<a name="sparc64"></a> |
<a name="vax"></a> |
<a name="vax"></a> |
|
<a name="zaurus"></a> |
|
|
<ul> |
<ul> |
|
|
|
<li><a name="agp"></a> |
|
<font color="#009000"><strong>007: SECURITY FIX: January 3, 2007</strong></font> |
|
<i>i386 only</i><br> |
|
Insufficient validation in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vga&sektion=4">vga(4)</a> |
|
may allow an attacker to gain root privileges if the kernel is compiled with |
|
<tt>option PCIAGP</tt> |
|
and the actual device is not an AGP device. |
|
The <tt>PCIAGP</tt> option is present by default on i386 |
|
kernels only. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="ports-tar"></a> |
<li><a name="ports-tar"></a> |
<font color="#009000"><strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>006: FTP DISTRIBUTION ERROR: December 4, 2006</strong></font> <i>All architectures</i><br> |