===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata42.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -r1.43 -r1.44
--- www/errata42.html 2014/03/31 03:12:47 1.43
+++ www/errata42.html 2014/03/31 16:02:48 1.44
@@ -78,7 +78,8 @@
-
-015: SECURITY FIX: October 2, 2008 All architectures
+015: SECURITY FIX: October 2, 2008
+ All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
solicitation requests maybe allowing a nearby attacker to intercept traffic.
The attacker must have IPv6 connectivity to the same router as their target for
@@ -90,7 +91,8 @@
-
-014: RELIABILITY FIX: July 29, 2008 All architectures
+014: RELIABILITY FIX: July 29, 2008
+ All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
was exercised by the named(8) patch for port randomization). Since INET6 is
enabled by default, this condition affects all systems.
@@ -100,7 +102,8 @@
-
-013: SECURITY FIX: July 23, 2008 All architectures
+013: SECURITY FIX: July 23, 2008
+ All architectures
2nd revision, July 23, 2008
A vulnerability has been found with BIND. An attacker could use this vulnerability
to poison the cache of a recursive resolving name server.
@@ -111,7 +114,8 @@
-
-012: SECURITY FIX: July 15, 2008 All architectures
+012: SECURITY FIX: July 15, 2008
+ All architectures
Multiple vulnerabilities have been discovered in X.Org.
RENDER Extension heap buffer overflow,
RENDER Extension crash,
@@ -129,7 +133,8 @@
-
-011: SECURITY FIX: April 3, 2008 All architectures
+011: SECURITY FIX: April 3, 2008
+ All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
by refusing to listen on a port unless all address families bind
successfully.
@@ -138,7 +143,8 @@
-
-010: SECURITY FIX: March 30, 2008 All architectures
+010: SECURITY FIX: March 30, 2008
+ All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand
directive was in effect, allowing users with write access to this file to
execute arbitrary commands. This behaviour was documented, but was an unsafe
@@ -148,28 +154,32 @@
-
-009: SECURITY FIX: March 7, 2008 All architectures
+009: SECURITY FIX: March 7, 2008
+ All architectures
Buffer overflow in ppp command prompt parsing.
A source code patch exists which remedies this problem.
-
-008: RELIABILITY FIX: February 25, 2008 All architectures
+008: RELIABILITY FIX: February 25, 2008
+ All architectures
Malformed IPv6 routing headers can cause a kernel panic.
A source code patch exists which remedies this problem.
-
-007: RELIABILITY FIX: February 22, 2008 All architectures
+007: RELIABILITY FIX: February 22, 2008
+ All architectures
Incorrect assumptions in tcp_respond can lead to a kernel panic.
A source code patch exists which remedies this problem.
-
-006: SECURITY FIX: February 8, 2008 All architectures
+006: SECURITY FIX: February 8, 2008
+ All architectures
2nd revision, February 10, 2008
Multiple vulnerabilities have been discovered in X.Org.
XFree86 Misc extension out of bounds array index,
@@ -190,21 +200,24 @@
-
-005: RELIABILITY FIX: January 11, 2008 All architectures
+005: RELIABILITY FIX: January 11, 2008
+ All architectures
A missing NULL pointer check can lead to a kernel panic.
A source code patch exists which remedies this problem.
-
-004: RELIABILITY FIX: November 27, 2007 All architectures
+004: RELIABILITY FIX: November 27, 2007
+ All architectures
A memory leak in pf can lead to machine lockups.
A source code patch exists which remedies this problem.
-
-003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007 i386 only
+003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007
+ i386 only
Some older BIOSes are unable to boot CD1 (ie. the commercial release sold
by the project, not the CD images available on the net).
A workaround using CD2 (amd64 architecture) is as follows.
@@ -224,14 +237,16 @@
-
-002: SECURITY FIX: October 10, 2007 All architectures
+002: SECURITY FIX: October 10, 2007
+ All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
A source code patch exists which remedies this problem.
-
-001: SECURITY FIX: October 8, 2007 All architectures
+001: SECURITY FIX: October 8, 2007
+ All architectures
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.