===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata23.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -r1.63 -r1.64
--- www/errata23.html 2014/03/31 04:11:40 1.63
+++ www/errata23.html 2014/03/31 16:02:48 1.64
@@ -77,7 +77,8 @@
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
@@ -85,13 +86,15 @@
This is the second version of the patch.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.
-
-HARDWARE SUPPORT All architectures
+HARDWARE SUPPORT
+ All architectures
Some ATAPI cdroms which do not support the full mandatory command set,
(e.g. ATAPI_READ_CD_CAPACITY) do not work with the acd(4) driver.
A patch is
@@ -99,33 +102,38 @@
available here.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
Chpass(1) has a file descriptor leak which allows an
attacker to modify /etc/master.passwd.
A source code patch exists which remedies this problem.
-
-RELIABILITY FIX All architectures
+RELIABILITY FIX
+ All architectures
Calling readv(2) with iov_len < 0 or > INT_MAX would result in a
kernel panic. This is the third revision of this patch.
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
Inetd had a file descriptor leak. A patch is
available here.
-
-BUG FIX All architectures
+BUG FIX
+ All architectures
As shipped, unionfs had some serious problems.
A patch is available to solve this.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
Some non-allocated file descriptors have implied uses according to
system libraries, and hence setuid and setgid processes should not
be executed with these descriptors unallocated. A patch which forces
@@ -135,7 +143,8 @@
available here.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A benign looking buffer overflow in the resolver routines was re-introduced
accidentally. The previously fixed behaviour is more correct. A patch
to fix this is
@@ -143,7 +152,8 @@
available here.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
Vulnerabilities have been found in the X11, Xt, Xaw and Xmu
libraries. These affect xterm and all other setuid-root programs that
use these libraries. The problems are associated with buffer overflows
@@ -158,7 +168,8 @@
OpenBSD 2.3 X11 tree, is available now.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
The kill(2) system call previously would permit a large set of signals to
be delivered to setuid or setgid processes. If such processes were using
those signals in dubious ways, this could have resulted in security
@@ -168,7 +179,8 @@
available.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
A possible new security problem exists if you rely on securelevels and
immutable or append-only files or character devices. The fix does not
permit mmap'ing of immutable or append-only files which are otherwise
@@ -178,7 +190,8 @@
A source code patch exists which remedies this problem.
-
-SECURITY FIX All architectures
+SECURITY FIX
+ All architectures
If IPSEC communication is attempted by starting photurisd(8) (which is
disabled by default), a system crash may be evoked from remote if
an attacker uses some classes of invalid packets.
@@ -186,7 +199,8 @@
A source code patch exists which remedies this problem.
-
- SECURITY FIX All architectures
+ - SECURITY FIX
+ All architectures
As stated in CERT advisory VB-98.04, there are buffer
overrun problems in xterm related to the input-Method,
preeditType, and *Keymap resources. Additional buffer overruns exist in