[BACK]Return to errata41.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata41.html between version 1.39 and 1.40

version 1.39, 2014/10/02 14:34:45 version 1.40, 2015/02/14 04:36:51
Line 83 
Line 83 
   
 <ul>  <ul>
   
 <li><a name="016_openssh2"></a>  <li id="016_openssh2">
 <font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: April 3, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Avoid possible hijacking of X11-forwarded connections with sshd(8)  Avoid possible hijacking of X11-forwarded connections with sshd(8)
Line 93 
Line 93 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="015_openssh"></a>  <li id="015_openssh">
 <font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font>  <font color="#009000"><strong>015: SECURITY FIX: March 30, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>  sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) <em>ForceCommand</em>
Line 104 
Line 104 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="014_ppp"></a>  <li id="014_ppp">
 <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: March 7, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Buffer overflow in ppp command prompt parsing.<br>  Buffer overflow in ppp command prompt parsing.<br>
Line 112 
Line 112 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="013_tcprespond"></a>  <li id="013_tcprespond">
 <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: February 22, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>  Incorrect assumptions in tcp_respond can lead to a kernel panic.<br>
Line 120 
Line 120 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="012_xorg"></a>  <li id="012_xorg">
 <font color="#009000"><strong>012: SECURITY FIX: February 8, 2008</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: February 8, 2008</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <strong>2nd revision, February 10, 2008</strong><br>  <strong>2nd revision, February 10, 2008</strong><br>
Line 142 
Line 142 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="011_openssl"></a>  <li id="011_openssl">
 <font color="#009000"><strong>011: SECURITY FIX: October 10, 2007</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: October 10, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.  The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
Line 151 
Line 151 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="010_dhcpd"></a>  <li id="010_dhcpd">
 <font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: October 8, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>  Malicious DHCP clients could cause dhcpd(8) to corrupt its stack<br>
Line 162 
Line 162 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="009_file"></a>  <li id="009_file">
 <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: July 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>  Fix possible heap overflow in file(1), aka CVE-2007-1536.<br>
Line 170 
Line 170 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="008_xorg"></a>  <li id="008_xorg">
 <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>  <font color="#009000"><strong>008: STABILITY FIX: May 9, 2007</strong></font>
 &nbsp; <i>All Architectures</i><br>  &nbsp; <i>All Architectures</i><br>
 A malicious client can cause a division by zero.<br>  A malicious client can cause a division by zero.<br>
Line 178 
Line 178 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="007_kroute"></a>  <li id="007_kroute">
 <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: April 30, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Link state is not correctly tracked in ospfd and ripd.<br>  Link state is not correctly tracked in ospfd and ripd.<br>
Line 186 
Line 186 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="006_altivec"></a>  <li id="006_altivec">
 <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>006: STABILITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>PowerPC</i><br>  &nbsp; <i>PowerPC</i><br>
 An unhandled AltiVec assist exception can cause a kernel panic.<br>  An unhandled AltiVec assist exception can cause a kernel panic.<br>
Line 194 
Line 194 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="005_route6"></a>  <li id="005_route6">
 <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPv6 type 0 route headers can be used to mount a DoS attack against  IPv6 type 0 route headers can be used to mount a DoS attack against
Line 204 
Line 204 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="004_xorg"></a>  <li id="004_xorg">
 <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>004: SECURITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been discovered in X.Org.<br>  Multiple vulnerabilities have been discovered in X.Org.<br>
Line 222 
Line 222 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="003_spamd"></a>  <li id="003_spamd">
 <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs found in the spamd sychronization mechanism could cause corrupted  Bugs found in the spamd sychronization mechanism could cause corrupted
Line 231 
Line 231 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="002_splnet"></a>  <li id="002_splnet">
 <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>002: STABILITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect spl level can lead to panics under heavy kqueue usage.<br>  Incorrect spl level can lead to panics under heavy kqueue usage.<br>
Line 239 
Line 239 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="001_mbuf"></a>  <li id="001_mbuf">
 <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: April 27, 2007</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect mbuf handling for ICMP6 packets.<br>  Incorrect mbuf handling for ICMP6 packets.<br>

Legend:
Removed from v.1.39  
changed lines
  Added in v.1.40