[BACK]Return to errata39.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata39.html between version 1.6 and 1.7

version 1.6, 2006/11/21 03:19:34 version 1.7, 2007/01/03 21:14:39
Line 66 
Line 66 
 <a name="hp300"></a>  <a name="hp300"></a>
 <a name="hppa"></a>  <a name="hppa"></a>
 <a name="i386"></a>  <a name="i386"></a>
   <a name="luna88k"></a>
 <a name="mac68k"></a>  <a name="mac68k"></a>
 <a name="macppc"></a>  <a name="macppc"></a>
 <a name="mvme68k"></a>  <a name="mvme68k"></a>
 <a name="mvme88k"></a>  <a name="mvme88k"></a>
   <a name="sgi"></a>
 <a name="sparc"></a>  <a name="sparc"></a>
 <a name="sparc64"></a>  <a name="sparc64"></a>
 <a name="vax"></a>  <a name="vax"></a>
   <a name="zaurus"></a>
 <ul>  <ul>
   
   <li><a name="agp"></a>
   <font color="#009000"><strong>017: SECURITY FIX: January 3, 2007</strong></font>
   &nbsp; <i>i386 only</i><br>
   Insufficient validation in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vga&amp;sektion=4">vga(4)</a>
   may allow an attacker to gain root privileges if the kernel is compiled with
   <tt>option PCIAGP</tt>
   and the actual device is not an AGP device.
   The <tt>PCIAGP</tt> option is present by default on i386
   kernels only.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
 <li><a name="ldso"></a>  <li><a name="ldso"></a>
 <font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font> &nbsp; <i>All architectures</i><br>

Legend:
Removed from v.1.6  
changed lines
  Added in v.1.7