===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata38.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -c -r1.47 -r1.48
*** www/errata38.html 2014/10/02 14:34:45 1.47
--- www/errata38.html 2015/02/14 04:36:51 1.48
***************
*** 83,89 ****
! -
020: SECURITY FIX: October 12, 2006
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
--- 83,89 ----
! -
020: SECURITY FIX: October 12, 2006
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
***************
*** 99,105 ****
A source code patch exists which remedies this problem.
!
-
019: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
--- 99,105 ----
A source code patch exists which remedies this problem.
!
-
019: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
***************
*** 112,118 ****
A source code patch exists which remedies this problem.
!
-
018: SECURITY FIX: October 7, 2006
All architectures
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
--- 112,118 ----
A source code patch exists which remedies this problem.
!
-
018: SECURITY FIX: October 7, 2006
All architectures
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
***************
*** 130,136 ****
A source code patch exists which remedies this problem.
!
-
017: SECURITY FIX: October 7, 2006
All architectures
httpd(8)
--- 130,136 ----
A source code patch exists which remedies this problem.
!
-
017: SECURITY FIX: October 7, 2006
All architectures
httpd(8)
***************
*** 143,149 ****
A source code patch exists which remedies this problem.
!
-
016: SECURITY FIX: September 8, 2006
All architectures
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
--- 143,149 ----
A source code patch exists which remedies this problem.
!
-
016: SECURITY FIX: September 8, 2006
All architectures
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
***************
*** 155,161 ****
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: September 8, 2006
All architectures
Two Denial of Service issues have been found with BIND.
--- 155,161 ----
A source code patch exists which remedies this problem.
!
-
015: SECURITY FIX: September 8, 2006
All architectures
Two Denial of Service issues have been found with BIND.
***************
*** 172,178 ****
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: September 2, 2006
All architectures
Due to the failure to correctly validate LCP configuration option lengths,
--- 172,178 ----
A source code patch exists which remedies this problem.
!
-
014: SECURITY FIX: September 2, 2006
All architectures
Due to the failure to correctly validate LCP configuration option lengths,
***************
*** 185,191 ****
A source code patch exists which remedies this problem.
!
-
013: SECURITY FIX: August 25, 2006
All architectures
A problem in
--- 185,191 ----
A source code patch exists which remedies this problem.
!
-
013: SECURITY FIX: August 25, 2006
All architectures
A problem in
***************
*** 200,206 ****
A source code patch exists which remedies this problem.
!
-
012: SECURITY FIX: August 25, 2006
All architectures
It is possible to cause the kernel to panic when more than the default number of
--- 200,206 ----
A source code patch exists which remedies this problem.
!
-
012: SECURITY FIX: August 25, 2006
All architectures
It is possible to cause the kernel to panic when more than the default number of
***************
*** 210,216 ****
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: August 25, 2006
All architectures
Due to an off-by-one error in
--- 210,216 ----
A source code patch exists which remedies this problem.
!
-
011: SECURITY FIX: August 25, 2006
All architectures
Due to an off-by-one error in
***************
*** 224,230 ****
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: August 25, 2006
All architectures
A potential denial of service problem has been found in sendmail. A message
--- 224,230 ----
A source code patch exists which remedies this problem.
!
-
010: SECURITY FIX: August 25, 2006
All architectures
A potential denial of service problem has been found in sendmail. A message
***************
*** 235,241 ****
A source code patch exists which remedies this problem.
!
-
009: SECURITY FIX: July 30, 2006
All architectures
httpd(8)'s
--- 235,241 ----
A source code patch exists which remedies this problem.
!
-
009: SECURITY FIX: July 30, 2006
All architectures
httpd(8)'s
***************
*** 249,255 ****
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: June 15, 2006
All architectures
A potential denial of service problem has been found in sendmail. A malformed MIME
--- 249,255 ----
A source code patch exists which remedies this problem.
!
-
008: SECURITY FIX: June 15, 2006
All architectures
A potential denial of service problem has been found in sendmail. A malformed MIME
***************
*** 263,269 ****
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: May 2, 2006
All architectures
A security vulnerability has been found in the X.Org server --
--- 263,269 ----
A source code patch exists which remedies this problem.
!
-
007: SECURITY FIX: May 2, 2006
All architectures
A security vulnerability has been found in the X.Org server --
***************
*** 275,281 ****
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 25, 2006
All architectures
A race condition has been reported to exist in the handling by sendmail of
--- 275,281 ----
A source code patch exists which remedies this problem.
!
-
006: SECURITY FIX: March 25, 2006
All architectures
A race condition has been reported to exist in the handling by sendmail of
***************
*** 286,292 ****
A source code patch exists which remedies this problem.
!
-
005: SECURITY FIX: February 12, 2006
All architectures
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
--- 286,292 ----
A source code patch exists which remedies this problem.
!
-
005: SECURITY FIX: February 12, 2006
All architectures
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
***************
*** 301,307 ****
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: January 13, 2006
i386 architecture
Constrain
--- 301,307 ----
A source code patch exists which remedies this problem.
!
-
004: RELIABILITY FIX: January 13, 2006
i386 architecture
Constrain
***************
*** 313,319 ****
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: January 13, 2006
i386 architecture
Change the implementation of i386 W^X so that the "execute line" can move around.
--- 313,319 ----
A source code patch exists which remedies this problem.
!
-
003: RELIABILITY FIX: January 13, 2006
i386 architecture
Change the implementation of i386 W^X so that the "execute line" can move around.
***************
*** 329,335 ****
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: January 5, 2006
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
--- 329,335 ----
A source code patch exists which remedies this problem.
!
-
002: SECURITY FIX: January 5, 2006
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
***************
*** 338,344 ****
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: January 5, 2006
All architectures
A buffer overflow has been found in the Perl interpreter with the sprintf function which
--- 338,344 ----
A source code patch exists which remedies this problem.
!
-
001: SECURITY FIX: January 5, 2006
All architectures
A buffer overflow has been found in the Perl interpreter with the sprintf function which