=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata33.html,v retrieving revision 1.71 retrieving revision 1.72 diff -c -r1.71 -r1.72 *** www/errata33.html 2016/08/15 02:22:06 1.71 --- www/errata33.html 2016/10/16 19:11:29 1.72 *************** *** 70,76 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

--- 70,76 ----


! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

*************** *** 96,102 **** the client and allowing clients to check out files outside the CVS repository.
! A source code patch exists which remedies this problem.

  • --- 96,102 ---- the client and allowing clients to check out files outside the CVS repository.
    ! A source code patch exists which remedies this problem.

  • *************** *** 107,113 **** A remote attacker can use the bug to cause an OpenSSL application to crash; this may lead to a denial of service.
    ! A source code patch exists which remedies this problem.

  • --- 107,113 ---- A remote attacker can use the bug to cause an OpenSSL application to crash; this may lead to a denial of service.
    ! A source code patch exists which remedies this problem.

  • *************** *** 119,125 **** cause isakmpd to crash or to loop endlessly. This patch fixes these problems and removes some memory leaks.
    ! A source code patch exists which remedies this problem.

  • --- 119,125 ---- cause isakmpd to crash or to loop endlessly. This patch fixes these problems and removes some memory leaks.
    ! A source code patch exists which remedies this problem.

  • *************** *** 130,136 **** access module, using IP addresses without a netmask on big endian 64-bit platforms causes the rules to fail to match. This only affects sparc64.
    ! A source code patch exists which remedies this problem.

  • --- 130,136 ---- access module, using IP addresses without a netmask on big endian 64-bit platforms causes the rules to fail to match. This only affects sparc64.
    ! A source code patch exists which remedies this problem.

  • *************** *** 141,147 **** send out-of-order TCP segments and trick the system into using all available memory buffers.
    ! A source code patch exists which remedies this problem.

  • --- 141,147 ---- send out-of-order TCP segments and trick the system into using all available memory buffers.
    ! A source code patch exists which remedies this problem.

  • *************** *** 151,157 **** font.aliases files in XFree86. Thanks to ProPolice, these cannot be exploited to gain privileges, but they can cause the X server to abort.
    ! A source code patch exists which remedies this problem.

  • --- 151,157 ---- font.aliases files in XFree86. Thanks to ProPolice, these cannot be exploited to gain privileges, but they can cause the X server to abort.
    ! A source code patch exists which remedies this problem.

  • *************** *** 161,167 **** to cause a denial of service attack against hosts with reachable IPv6 TCP ports.
    ! A source code patch exists which remedies this problem.

  • --- 161,167 ---- to cause a denial of service attack against hosts with reachable IPv6 TCP ports.
    ! A source code patch exists which remedies this problem.

  • *************** *** 172,178 **** system call that could be used by an attacker to write to kernel memory under certain circumstances.
    ! A source code patch exists which remedies this problem.

  • --- 172,178 ---- system call that could be used by an attacker to write to kernel memory under certain circumstances.
    ! A source code patch exists which remedies this problem.

  • *************** *** 182,188 **** isakmpd(8) have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs.
    ! A source code patch exists which remedies this problem.

  • --- 182,188 ---- isakmpd(8) have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs.
    ! A source code patch exists which remedies this problem.

  • *************** *** 194,200 **** semop(2) functions certain arguments.
    ! A source code patch exists which remedies this problem.

  • --- 194,200 ---- semop(2) functions certain arguments.
    ! A source code patch exists which remedies this problem.

  • *************** *** 202,208 ****   All architectures
    It is possible for a local user to cause a crash via sysctl(3) with certain arguments.
    ! A source code patch exists which remedies this problem.

  • --- 202,208 ----   All architectures
    It is possible for a local user to cause a crash via sysctl(3) with certain arguments.
    ! A source code patch exists which remedies this problem.

  • *************** *** 212,218 **** It is possible for a local user to execute arbitrary code resulting in escalation of privileges due to a stack overrun in compat_ibcs2(8).
    ! A source code patch exists which remedies this problem.

  • --- 212,218 ---- It is possible for a local user to execute arbitrary code resulting in escalation of privileges due to a stack overrun in compat_ibcs2(8).
    ! A source code patch exists which remedies this problem.

  • *************** *** 220,226 ****   All architectures
    It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
    ! A source code patch exists which remedies this problem.

  • --- 220,226 ----   All architectures
    It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
    ! A source code patch exists which remedies this problem.

  • *************** *** 232,238 **** or potentially run arbitrary code as the user www (although it is believed that ProPolice will prevent code execution).
    ! A source code patch exists which remedies this problem.

  • --- 232,238 ---- or potentially run arbitrary code as the user www (although it is believed that ProPolice will prevent code execution).
    ! A source code patch exists which remedies this problem.

  • *************** *** 240,246 ****   All architectures
    It is possible for a local user to cause a system panic by flooding it with spoofed ARP requests.
    ! A source code patch exists which remedies this problem.

  • --- 240,246 ----   All architectures
    It is possible for a local user to cause a system panic by flooding it with spoofed ARP requests.
    ! A source code patch exists which remedies this problem.

  • *************** *** 250,256 **** attacker to mount a denial of service attack against applications linked with ssl(3). This does not affect OpenSSH.
    ! A source code patch exists which remedies this problem.

  • --- 250,256 ---- attacker to mount a denial of service attack against applications linked with ssl(3). This does not affect OpenSSH.
    ! A source code patch exists which remedies this problem.

  • *************** *** 259,265 **** Three cases of potential access to freed memory have been found in pf(4). At least one of them could be used to panic pf with active scrub rules remotely.
    ! A source code patch exists which remedies this problem.

  • --- 259,265 ---- Three cases of potential access to freed memory have been found in pf(4). At least one of them could be used to panic pf with active scrub rules remotely.
    ! A source code patch exists which remedies this problem.

  • *************** *** 268,274 **** A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges.
    ! A source code patch exists which remedies this problem. NOTE: this is the second revision of the patch that fixes an additional problem. --- 268,274 ---- A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges.
    ! A source code patch exists which remedies this problem. NOTE: this is the second revision of the patch that fixes an additional problem. *************** *** 278,284 ****   All architectures
    All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. It is unclear whether or not this bug is exploitable.
    ! A source code patch exists which remedies this problem. NOTE: this is the second revision of the patch that fixes an additional problem. --- 278,284 ----   All architectures
    All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. It is unclear whether or not this bug is exploitable.
    ! A source code patch exists which remedies this problem. NOTE: this is the second revision of the patch that fixes an additional problem. *************** *** 288,294 ****   All architectures
    Root may be able to reduce the security level by taking advantage of an integer overflow when the semaphore limits are made very large.
    ! A source code patch exists which remedies this problem.

  • --- 288,294 ----   All architectures
    Root may be able to reduce the security level by taking advantage of an integer overflow when the semaphore limits are made very large.
    ! A source code patch exists which remedies this problem.

  • *************** *** 297,303 **** An improper bounds check in the semget(2) system call can allow a local user to cause a kernel panic.
    ! A source code patch exists which remedies this problem.

  • --- 297,303 ---- An improper bounds check in the semget(2) system call can allow a local user to cause a kernel panic.
    ! A source code patch exists which remedies this problem.

  • *************** *** 308,314 **** Since this same bug resulted in a root compromise in the wu-ftpd ftp server it is possible that this bug may allow an attacker to gain escalated privileges on OpenBSD.
    ! A source code patch exists which remedies this problem.

    --- 308,314 ---- Since this same bug resulted in a root compromise in the wu-ftpd ftp server it is possible that this bug may allow an attacker to gain escalated privileges on OpenBSD.
    ! A source code patch exists which remedies this problem.