===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata24.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -c -r1.58 -r1.59
*** www/errata24.html 2014/03/31 03:12:47 1.58
--- www/errata24.html 2014/03/31 03:36:54 1.59
***************
*** 75,117 ****
-
- All architectures
-
! RELIABILITY FIX
A local user can crash the system by reading a file larger than 64meg
from an ext2fs partition.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX
A local user can crash the system because of a bug in the vfs layer.
A source code patch exists which remedies this problem.
-
! SECURITY FIX
A machine crash is possible when playing with poll(2).
A source code patch exists which remedies this problem.
-
! SECURITY FIX
A machine crash is possible when playing with link(2) on FFS.
A source code patch exists which remedies this problem.
This is version four of the patch.
-
! SECURITY FIX
A buffer overflow existed in ping(8), which may have a security issue.
A source code patch exists which remedies this problem.
-
! SECURITY FIX
A race condition in IP ipq handling could permit a remote crash.
A source code patch exists which remedies this problem.
--- 75,115 ----
-
! RELIABILITY FIX All architectures
A local user can crash the system by reading a file larger than 64meg
from an ext2fs partition.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX All architectures
A local user can crash the system because of a bug in the vfs layer.
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
A machine crash is possible when playing with poll(2).
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
A machine crash is possible when playing with link(2) on FFS.
A source code patch exists which remedies this problem.
This is version four of the patch.
-
! SECURITY FIX All architectures
A buffer overflow existed in ping(8), which may have a security issue.
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
A race condition in IP ipq handling could permit a remote crash.
A source code patch exists which remedies this problem.
***************
*** 119,158 ****
and the tcp decoding patch.
-
! SECURITY FIX
A race condition existed between accept(2) and select(2) which could
permit an attacker to hang sockets from remote.
A source code patch exists which remedies this problem.
-
! SECURITY FIX
IP fragment assembly can bog the machine excessively and cause problems.
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX
The readv(2) and writev(2) system calls would not accept a struct iovec
with an iov_len of 0. This causes a db test in perl to fail.
A source code patch exists which remedies this problem.
-
! SECURITY FIX
TCP/IP RST handling was too sloppy.
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
memory".
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX
A problem with writing to NFS version 3 mounted filesystems from Solaris 7
hosts exists. Attempts to create files will result in an error such as
"Inappropriate file type or format".
--- 117,156 ----
and the tcp decoding patch.
-
! SECURITY FIX All architectures
A race condition existed between accept(2) and select(2) which could
permit an attacker to hang sockets from remote.
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
IP fragment assembly can bog the machine excessively and cause problems.
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX All architectures
The readv(2) and writev(2) system calls would not accept a struct iovec
with an iov_len of 0. This causes a db test in perl to fail.
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
TCP/IP RST handling was too sloppy.
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX All architectures
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
memory".
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX All architectures
A problem with writing to NFS version 3 mounted filesystems from Solaris 7
hosts exists. Attempts to create files will result in an error such as
"Inappropriate file type or format".
***************
*** 160,166 ****
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX
A problem with NFS version 3 mounts on big endian machines (m68k, sparc
and powerpc) exists when mounting filesystems larger than 2gig. You
can see evidence of the bug by running df(1) and checking for negative
--- 158,164 ----
A source code patch exists which remedies this problem.
-
! FUNCTIONALITY FIX All architectures
A problem with NFS version 3 mounts on big endian machines (m68k, sparc
and powerpc) exists when mounting filesystems larger than 2gig. You
can see evidence of the bug by running df(1) and checking for negative
***************
*** 169,175 ****
A source code patch exists which remedies this problem.
-
! SECURITY FIX
A security problem exists in the curses and ocurses libraries that affect
setuid programs linked with -lcurses or -locurses.
--- 167,173 ----
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
A security problem exists in the curses and ocurses libraries that affect
setuid programs linked with -lcurses or -locurses.
***************
*** 180,186 ****
platform. Unpack it in /usr/lib.
-
! FUNCTIONALITY FIX
A workaround for an xterm problem that causes vi to not
restore the correct cursor position on exit.
--- 178,184 ----
platform. Unpack it in /usr/lib.
-
! FUNCTIONALITY FIX All architectures
A workaround for an xterm problem that causes vi to not
restore the correct cursor position on exit.
***************
*** 195,207 ****
big endian version.
-
! FUNCTIONALITY FIX
userdir support was accidentally left out of httpd(8).
A source code patch exists which remedies this problem.
-
! SECURITY FIX
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
--- 193,205 ----
big endian version.
-
! FUNCTIONALITY FIX All architectures
userdir support was accidentally left out of httpd(8).
A source code patch exists which remedies this problem.
-
! SECURITY FIX All architectures
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
by default, but some people may actually be using it.
***************
*** 209,215 ****
This is the second version of the patch.
-
! SECURITY FIX
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.
--- 207,213 ----
This is the second version of the patch.
-
! SECURITY FIX All architectures
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.