===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata38.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -r1.47 -r1.48
--- www/errata38.html 2014/10/02 14:34:45 1.47
+++ www/errata38.html 2015/02/14 04:36:51 1.48
@@ -83,7 +83,7 @@
--
+
-
020: SECURITY FIX: October 12, 2006
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
@@ -99,7 +99,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
019: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
@@ -112,7 +112,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
018: SECURITY FIX: October 7, 2006
All architectures
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
@@ -130,7 +130,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
017: SECURITY FIX: October 7, 2006
All architectures
httpd(8)
@@ -143,7 +143,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
016: SECURITY FIX: September 8, 2006
All architectures
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for
@@ -155,7 +155,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
015: SECURITY FIX: September 8, 2006
All architectures
Two Denial of Service issues have been found with BIND.
@@ -172,7 +172,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
014: SECURITY FIX: September 2, 2006
All architectures
Due to the failure to correctly validate LCP configuration option lengths,
@@ -185,7 +185,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
013: SECURITY FIX: August 25, 2006
All architectures
A problem in
@@ -200,7 +200,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
012: SECURITY FIX: August 25, 2006
All architectures
It is possible to cause the kernel to panic when more than the default number of
@@ -210,7 +210,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
011: SECURITY FIX: August 25, 2006
All architectures
Due to an off-by-one error in
@@ -224,7 +224,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
010: SECURITY FIX: August 25, 2006
All architectures
A potential denial of service problem has been found in sendmail. A message
@@ -235,7 +235,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
009: SECURITY FIX: July 30, 2006
All architectures
httpd(8)'s
@@ -249,7 +249,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
008: SECURITY FIX: June 15, 2006
All architectures
A potential denial of service problem has been found in sendmail. A malformed MIME
@@ -263,7 +263,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
007: SECURITY FIX: May 2, 2006
All architectures
A security vulnerability has been found in the X.Org server --
@@ -275,7 +275,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
006: SECURITY FIX: March 25, 2006
All architectures
A race condition has been reported to exist in the handling by sendmail of
@@ -286,7 +286,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
005: SECURITY FIX: February 12, 2006
All architectures
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the
@@ -301,7 +301,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
004: RELIABILITY FIX: January 13, 2006
i386 architecture
Constrain
@@ -313,7 +313,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
003: RELIABILITY FIX: January 13, 2006
i386 architecture
Change the implementation of i386 W^X so that the "execute line" can move around.
@@ -329,7 +329,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
002: SECURITY FIX: January 5, 2006
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
@@ -338,7 +338,7 @@
A source code patch exists which remedies this problem.
-
-
+
-
001: SECURITY FIX: January 5, 2006
All architectures
A buffer overflow has been found in the Perl interpreter with the sprintf function which