===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata25.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -c -r1.55 -r1.56
*** www/errata25.html 2014/03/31 04:11:40 1.55
--- www/errata25.html 2014/03/31 16:02:48 1.56
***************
*** 77,90 ****
-
! SECURITY FIX: Aug 30, 1999 All architectures
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
run sendmail as the user, not as root.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 12, 1999 All architectures
The procfs and fdescfs filesystems had an overrun in their handling
of uio_offset in their readdir() routines. (These filesystems are not
enabled by default).
--- 77,92 ----
-
! SECURITY FIX: Aug 30, 1999
! All architectures
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
run sendmail as the user, not as root.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 12, 1999
! All architectures
The procfs and fdescfs filesystems had an overrun in their handling
of uio_offset in their readdir() routines. (These filesystems are not
enabled by default).
***************
*** 92,125 ****
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 9, 1999 All architectures
Stop profiling (see profil(2)) when we execve() a new process.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 6, 1999 All architectures
Packets that should have been handled by IPsec may be transmitted
as cleartext. PF_KEY SA expirations may leak kernel resources.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 5, 1999 All architectures
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
to use -execdir.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Jul 30, 1999 All architectures
Do not permit regular users to chflags(2) or fchflags(2) on character or
block devices which they may currently be the owner of.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Jul 27, 1999 All architectures
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
to avoid various groff features which may be security issues. On the
whole, this is not really a security issue, but it was discussed on
--- 94,132 ----
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 9, 1999
! All architectures
Stop profiling (see profil(2)) when we execve() a new process.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 6, 1999
! All architectures
Packets that should have been handled by IPsec may be transmitted
as cleartext. PF_KEY SA expirations may leak kernel resources.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Aug 5, 1999
! All architectures
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
to use -execdir.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Jul 30, 1999
! All architectures
Do not permit regular users to chflags(2) or fchflags(2) on character or
block devices which they may currently be the owner of.
A source code patch exists which remedies this problem.
-
! SECURITY FIX: Jul 27, 1999
! All architectures
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
to avoid various groff features which may be security issues. On the
whole, this is not really a security issue, but it was discussed on
***************
*** 128,162 ****
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX: May 19, 1999 All architectures
Programs using fts(3) could dump core when given a directory structure
with a very large number of entries.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX: May 19, 1999 All architectures
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
failure to retransmit correctly.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX All architectures
Retransmitted TCP packets could get corrupted when flowing over an
IPSEC ESP tunnel.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX All architectures
A local user can crash the system by reading a file larger than 64meg
from an ext2fs partition.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX All architectures
PF_KEY socket operations leak internal kernel resources, so that a
system running an IPsec key management daemon like photurisd or isakmpd
will cause the networking subsystem to stop working after a finite amount
--- 135,174 ----
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX: May 19, 1999
! All architectures
Programs using fts(3) could dump core when given a directory structure
with a very large number of entries.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX: May 19, 1999
! All architectures
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
failure to retransmit correctly.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX
! All architectures
Retransmitted TCP packets could get corrupted when flowing over an
IPSEC ESP tunnel.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX
! All architectures
A local user can crash the system by reading a file larger than 64meg
from an ext2fs partition.
A source code patch exists which remedies this problem.
-
! RELIABILITY FIX
! All architectures
PF_KEY socket operations leak internal kernel resources, so that a
system running an IPsec key management daemon like photurisd or isakmpd
will cause the networking subsystem to stop working after a finite amount