===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata39.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -c -r1.64 -r1.65
*** www/errata39.html 2017/03/28 06:41:18 1.64
--- www/errata39.html 2017/06/26 17:18:57 1.65
***************
*** 125,131 ****
2nd revision, March 17, 2007
Incorrect mbuf handling for ICMP6 packets.
Using
! pf(4)
to avoid the problem packets is an effective workaround until the patch
can be installed.
Use "block in inet6" in /etc/pf.conf
--- 125,131 ----
2nd revision, March 17, 2007
Incorrect mbuf handling for ICMP6 packets.
Using
! pf(4)
to avoid the problem packets is an effective workaround until the patch
can be installed.
Use "block in inet6" in /etc/pf.conf
***************
*** 157,163 ****
017: SECURITY FIX: January 3, 2007
i386 only
Insufficient validation in
! vga(4)
may allow an attacker to gain root privileges if the kernel is compiled with
option PCIAGP
and the actual device is not an AGP device.
--- 157,163 ----
017: SECURITY FIX: January 3, 2007
i386 only
Insufficient validation in
! vga(4)
may allow an attacker to gain root privileges if the kernel is compiled with
option PCIAGP
and the actual device is not an AGP device.
***************
*** 172,178 ****
016: SECURITY FIX: November 19, 2006
All architectures
The ELF
! ld.so(1)
fails to properly sanitize the environment. There is a potential localhost security
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
--- 172,178 ----
016: SECURITY FIX: November 19, 2006
All architectures
The ELF
! ld.so(1)
fails to properly sanitize the environment. There is a potential localhost security
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
***************
*** 186,192 ****
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
by Tavis Ormandy) that would cause
! sshd(8)
to spin until the login grace time expired.
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition
that could be exploited to perform a pre-authentication denial of service.
--- 186,192 ----
All architectures
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found
by Tavis Ormandy) that would cause
! sshd(8)
to spin until the login grace time expired.
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition
that could be exploited to perform a pre-authentication denial of service.
***************
*** 201,207 ****
014: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
! systrace(4)'s
STRIOCREPLACE support, found by
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
--- 201,207 ----
014: SECURITY FIX: October 7, 2006
All architectures
Fix for an integer overflow in
! systrace(4)'s
STRIOCREPLACE support, found by
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
***************
*** 231,237 ****