[BACK]Return to errata37.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata37.html between version 1.43 and 1.44

version 1.43, 2014/10/02 14:34:45 version 1.44, 2015/02/14 04:36:51
Line 83 
Line 83 
   
 <ul>  <ul>
   
 <li><a name="xorg"></a>  <li id="xorg">
 <font color="#009000"><strong>013: SECURITY FIX: May 2, 2006</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: May 2, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security vulnerability has been found in the X.Org server --  A security vulnerability has been found in the X.Org server --
Line 95 
Line 95 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: March 25, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition has been reported to exist in the handling by sendmail of  A race condition has been reported to exist in the handling by sendmail of
Line 106 
Line 106 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="ssh"></a>  <li id="ssh">
 <font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: February 12, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the  Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
Line 121 
Line 121 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="i386machdep"></a>  <li id="i386machdep">
 <font color="#009000"><strong>010: RELIABILITY FIX: January 13, 2006</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: January 13, 2006</strong></font>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Constrain  Constrain
Line 133 
Line 133 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="i386pmap"></a>  <li id="i386pmap">
 <font color="#009000"><strong>009: RELIABILITY FIX: January 13, 2006</strong></font>  <font color="#009000"><strong>009: RELIABILITY FIX: January 13, 2006</strong></font>
 &nbsp; <i>i386 architecture</i><br>  &nbsp; <i>i386 architecture</i><br>
 Change the implementation of i386 W^X so that the "execute line" can move around.  Change the implementation of i386 W^X so that the "execute line" can move around.
Line 149 
Line 149 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="fd"></a>  <li id="fd">
 <font color="#009000"><strong>008: SECURITY FIX: January 5, 2006</strong></font>  <font color="#009000"><strong>008: SECURITY FIX: January 5, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Do not allow users to trick suid programs into re-opening files via /dev/fd.  Do not allow users to trick suid programs into re-opening files via /dev/fd.
Line 158 
Line 158 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="perl"></a>  <li id="perl">
 <font color="#009000"><strong>007: SECURITY FIX: January 5, 2006</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: January 5, 2006</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in the Perl interpreter with the sprintf function which  A buffer overflow has been found in the Perl interpreter with the sprintf function which
Line 168 
Line 168 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="nat-t"></a>  <li id="nat-t">
 <font color="#009000"><strong>006: RELIABILITY FIX: November 5, 2005</strong></font>  <font color="#009000"><strong>006: RELIABILITY FIX: November 5, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to wrong advertisement of RFC 3947 compliance interoperability problems with  Due to wrong advertisement of RFC 3947 compliance interoperability problems with
Line 179 
Line 179 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="libz2"></a>  <li id="libz2">
 <font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: July 21, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
Line 191 
Line 191 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="libz"></a>  <li id="libz">
 <font color="#009000"><strong>004: SECURITY FIX: July 6, 2005</strong></font>  <font color="#009000"><strong>004: SECURITY FIX: July 6, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow has been found in  A buffer overflow has been found in
Line 202 
Line 202 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sudo"></a>  <li id="sudo">
 <font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: June 20, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a race condition in its command pathname handling, a user with  Due to a race condition in its command pathname handling, a user with
Line 215 
Line 215 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="getsockopt"></a>  <li id="getsockopt">
 <font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font>  <font color="#009000"><strong>002: RELIABILITY FIX: June 15, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As discovered by Stefan Miltchev calling  As discovered by Stefan Miltchev calling
Line 228 
Line 228 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="cvs"></a>  <li id="cvs">
 <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
   

Legend:
Removed from v.1.43  
changed lines
  Added in v.1.44