===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata39.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -c -r1.53 -r1.54
*** www/errata39.html 2016/02/20 14:18:42 1.53
--- www/errata39.html 2016/03/21 05:46:20 1.54
***************
*** 126,132 ****
2nd revision, March 17, 2007
Incorrect mbuf handling for ICMP6 packets.
Using
! pf(4)
to avoid the problem packets is an effective workaround until the patch
can be installed.
Use "block in inet6" in /etc/pf.conf
--- 126,132 ----
2nd revision, March 17, 2007
Incorrect mbuf handling for ICMP6 packets.
Using
! pf(4)
to avoid the problem packets is an effective workaround until the patch
can be installed.
Use "block in inet6" in /etc/pf.conf
***************
*** 158,164 ****
017: SECURITY FIX: January 3, 2007
i386 only
Insufficient validation in
! vga(4)
may allow an attacker to gain root privileges if the kernel is compiled with
option PCIAGP
and the actual device is not an AGP device.
--- 158,164 ----
017: SECURITY FIX: January 3, 2007
i386 only
Insufficient validation in
! vga(4)
may allow an attacker to gain root privileges if the kernel is compiled with
option PCIAGP
and the actual device is not an AGP device.
***************
*** 173,179 ****
016: SECURITY FIX: November 19, 2006
All architectures
The ELF
! ld.so(1)
fails to properly sanitize the environment. There is a potential localhost security
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
--- 173,179 ----
016: SECURITY FIX: November 19, 2006
All architectures
The ELF
! ld.so(1)
fails to properly sanitize the environment. There is a potential localhost security
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
***************
*** 187,193 ****
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
by Tavis Ormandy) that would cause
! sshd(8)
to spin until the login grace time expired.
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition
that could be exploited to perform a pre-authentication denial of service.
--- 187,193 ----
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
by Tavis Ormandy) that would cause
! sshd(8)
to spin until the login grace time expired.
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition
that could be exploited to perform a pre-authentication denial of service.
***************
*** 202,208 ****
014: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
! systrace(4)'s
STRIOCREPLACE support, found by
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
--- 202,208 ----
014: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
! systrace(4)'s
STRIOCREPLACE support, found by
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
***************
*** 232,238 ****