version 1.6, 2006/11/21 03:19:34 |
version 1.7, 2007/01/03 21:14:39 |
|
|
<a name="hp300"></a> |
<a name="hp300"></a> |
<a name="hppa"></a> |
<a name="hppa"></a> |
<a name="i386"></a> |
<a name="i386"></a> |
|
<a name="luna88k"></a> |
<a name="mac68k"></a> |
<a name="mac68k"></a> |
<a name="macppc"></a> |
<a name="macppc"></a> |
<a name="mvme68k"></a> |
<a name="mvme68k"></a> |
<a name="mvme88k"></a> |
<a name="mvme88k"></a> |
|
<a name="sgi"></a> |
<a name="sparc"></a> |
<a name="sparc"></a> |
<a name="sparc64"></a> |
<a name="sparc64"></a> |
<a name="vax"></a> |
<a name="vax"></a> |
|
<a name="zaurus"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="agp"></a> |
|
<font color="#009000"><strong>017: SECURITY FIX: January 3, 2007</strong></font> |
|
<i>i386 only</i><br> |
|
Insufficient validation in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=vga&sektion=4">vga(4)</a> |
|
may allow an attacker to gain root privileges if the kernel is compiled with |
|
<tt>option PCIAGP</tt> |
|
and the actual device is not an AGP device. |
|
The <tt>PCIAGP</tt> option is present by default on i386 |
|
kernels only. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/i386/017_agp.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="ldso"></a> |
<li><a name="ldso"></a> |
<font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>016: SECURITY FIX: November 19, 2006</strong></font> <i>All architectures</i><br> |