===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata36.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -c -r1.51 -r1.52
*** www/errata36.html 2016/08/15 02:22:06 1.51
--- www/errata36.html 2016/10/16 19:11:29 1.52
***************
*** 70,76 ****
--- 70,76 ----
***************
*** 95,101 ****
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
--- 95,101 ----
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
***************
*** 106,112 ****
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
--- 106,112 ----
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
***************
*** 119,125 ****
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
--- 119,125 ----
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
***************
*** 132,138 ****
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
--- 132,138 ----
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 145,151 ****
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.
--- 145,151 ----
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.
***************
*** 156,162 ****
tcp(4)
timestamps.
!
A source code patch exists which remedies this problem.
--- 156,162 ----
tcp(4)
timestamps.
!
A source code patch exists which remedies this problem.
***************
*** 171,177 ****
Noone should use telnet anymore. Please use
ssh(1).
!
A source code patch exists which remedies this problem.
--- 171,177 ----
Noone should use telnet anymore. Please use
ssh(1).
!
A source code patch exists which remedies this problem.
***************
*** 183,189 ****
stack can lead to memory exhaustion or processing of TCP segments with
invalid SACK options and cause a system crash.
!
A source code patch exists which remedies this problem.
--- 183,189 ----
stack can lead to memory exhaustion or processing of TCP segments with
invalid SACK options and cause a system crash.
!
A source code patch exists which remedies this problem.
***************
*** 194,200 ****
copy(9)
functions to prevent their misuse.
!
A source code patch exists which remedies this problem.
--- 194,200 ----
copy(9)
functions to prevent their misuse.
!
A source code patch exists which remedies this problem.
***************
*** 205,211 ****
copy(9)
functions to prevent their misuse.
!
A source code patch exists which remedies this problem.
--- 205,211 ----
copy(9)
functions to prevent their misuse.
!
A source code patch exists which remedies this problem.
***************
*** 218,224 ****
retransmit timeout. By sending packets with specific values in the TCP
timestamp option, an attacker can cause a system panic.
!
A source code patch exists which remedies this problem.
--- 218,224 ----
retransmit timeout. By sending packets with specific values in the TCP
timestamp option, an attacker can cause a system panic.
!
A source code patch exists which remedies this problem.
***************
*** 233,239 ****
This would require enabling the XBitHack directive or server-side
includes and making use of a malicious document.
!
A source code patch exists which remedies this problem.
--- 233,239 ----
This would require enabling the XBitHack directive or server-side
includes and making use of a malicious document.
!
A source code patch exists which remedies this problem.
***************
*** 245,251 ****
library function contains a memory management error, which causes failure
to retrieve the current working directory if the path is very long.
!
A source code patch exists which remedies this problem.
--- 245,251 ----
library function contains a memory management error, which causes failure
to retrieve the current working directory if the path is very long.
!
A source code patch exists which remedies this problem.
***************
*** 259,265 ****
ipsec(4)
credentials on a socket.
!
A source code patch exists which remedies this problem.
--- 259,265 ----
ipsec(4)
credentials on a socket.
!
A source code patch exists which remedies this problem.
***************
*** 269,275 ****
Fix for transmit side breakage on macppc and mbuf leaks with
xl(4).
!
A source code patch exists which remedies this problem.
--- 269,275 ----
Fix for transmit side breakage on macppc and mbuf leaks with
xl(4).
!
A source code patch exists which remedies this problem.
***************
*** 280,286 ****
isakmpd(8)
and other ISAKMP/IKE implementations.
!
A source code patch exists which remedies this problem.
--- 280,286 ----
isakmpd(8)
and other ISAKMP/IKE implementations.
!
A source code patch exists which remedies this problem.
***************
*** 295,301 ****
lynx(1)
to exhaust memory and then crash when parsing such pages.
!
A source code patch exists which remedies this problem.
--- 295,301 ----
lynx(1)
to exhaust memory and then crash when parsing such pages.
!
A source code patch exists which remedies this problem.
***************
*** 306,312 ****
contains a bug that allows an attacker to crash his own connection, but it cannot
be used to deny service to other users.
!
A source code patch exists which remedies this problem.
--- 306,312 ----
contains a bug that allows an attacker to crash his own connection, but it cannot
be used to deny service to other users.
!
A source code patch exists which remedies this problem.
***************
*** 317,323 ****
cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and
thus slow DNS queries.
!
A source code patch exists which remedies this problem.
--- 317,323 ----
cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and
thus slow DNS queries.
!
A source code patch exists which remedies this problem.
***************
*** 327,333 ****
Fix detection of tape blocksize during device open. Corrects problem with
restore(8).
!
A source code patch exists which remedies this problem.
--- 327,333 ----
Fix detection of tape blocksize during device open. Corrects problem with
restore(8).
!
A source code patch exists which remedies this problem.