Index: releases/5.0R/DP1/relnotes-alpha.html =================================================================== --- releases/5.0R/DP1/relnotes-alpha.html +++ releases/5.0R/DP1/relnotes-alpha.html @@ -2143,7 +2143,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]
A programming error in zlib @@ -2161,7 +2161,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Index: releases/5.0R/DP1/relnotes-i386.html =================================================================== --- releases/5.0R/DP1/relnotes-i386.html +++ releases/5.0R/DP1/relnotes-i386.html @@ -2509,7 +2509,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -2527,7 +2527,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Index: releases/5.0R/DP1/relnotes-sparc64.html =================================================================== --- releases/5.0R/DP1/relnotes-sparc64.html +++ releases/5.0R/DP1/relnotes-sparc64.html @@ -2115,7 +2115,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -2133,7 +2133,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Index: releases/5.0R/DP2/relnotes-alpha.html =================================================================== --- releases/5.0R/DP2/relnotes-alpha.html +++ releases/5.0R/DP2/relnotes-alpha.html @@ -1489,7 +1489,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -1507,7 +1507,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Bugs in the TCP SYN cache (``syncache'') and SYN @@ -1515,7 +1515,7 @@ legitimate TCP/IP traffic to crash a machine, have been fixed. For a workaround and patches, see security advisory FreeBSD-SA-02:20. [MERGED]
A routing table memory leak, which could allow a @@ -1522,13 +1522,13 @@ remote attacker to exhaust the memory of a target machine, has been fixed. A workaround and patches can be found in security advisory FreeBSD-SA-02:21. [MERGED]
A bug with memory-mapped I/O, which could cause a system crash, has been fixed. For more information about a solution, see security advisory FreeBSD-SA-02:22. [MERGED]
A security hole, in which SUID programs could be made @@ -1536,7 +1536,7 @@ manipulation of their standard I/O file descriptors, has been fixed. Information regarding a solution can be found in security advisory FreeBSD-SA-02:23. [MERGED]
Some unexpected behavior could be allowed with FreeBSD-SA-02:24. [MERGED]
Multiple vulnerabilities were found in the bzip2. For more information, see security advisory FreeBSD-SA-02:25. [MERGED]
A bug has been fixed in the implementation of the TCP @@ -1581,7 +1581,7 @@ "REFENTRYTITLE">accept_filter(9)) were in use. This bug has been fixed; for more information, see security advisory FreeBSD-SA-02:26. [MERGED]
Due to a bug in /tmp/.X11-unix does not exist and the system can be made to reboot. This bug has been corrected (see security advisory FreeBSD-SA-02:27). [MERGED]
A buffer overflow in the resolver, which could be @@ -1600,7 +1600,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED]
@@ -1610,7 +1610,7 @@ "REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1623,7 +1623,7 @@ the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1634,7 +1634,7 @@ used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1670,7 +1670,7 @@ "REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1677,13 +1677,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1690,7 +1690,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1709,13 +1709,13 @@ "REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
Index: releases/5.0R/DP2/relnotes-i386.html =================================================================== --- releases/5.0R/DP2/relnotes-i386.html +++ releases/5.0R/DP2/relnotes-i386.html @@ -1591,7 +1591,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -1609,7 +1609,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Bugs in the TCP SYN cache (``syncache'') and SYN @@ -1617,7 +1617,7 @@ legitimate TCP/IP traffic to crash a machine, have been fixed. For a workaround and patches, see security advisory FreeBSD-SA-02:20. [MERGED]
A routing table memory leak, which could allow a @@ -1624,13 +1624,13 @@ remote attacker to exhaust the memory of a target machine, has been fixed. A workaround and patches can be found in security advisory FreeBSD-SA-02:21. [MERGED]
A bug with memory-mapped I/O, which could cause a system crash, has been fixed. For more information about a solution, see security advisory FreeBSD-SA-02:22. [MERGED]
A security hole, in which SUID programs could be made @@ -1638,7 +1638,7 @@ manipulation of their standard I/O file descriptors, has been fixed. Information regarding a solution can be found in security advisory FreeBSD-SA-02:23. [MERGED]
Some unexpected behavior could be allowed with FreeBSD-SA-02:24. [MERGED]
Multiple vulnerabilities were found in the bzip2. For more information, see security advisory FreeBSD-SA-02:25. [MERGED]
A bug has been fixed in the implementation of the TCP @@ -1683,7 +1683,7 @@ "REFENTRYTITLE">accept_filter(9)) were in use. This bug has been fixed; for more information, see security advisory FreeBSD-SA-02:26. [MERGED]
Due to a bug in /tmp/.X11-unix does not exist and the system can be made to reboot. This bug has been corrected (see security advisory FreeBSD-SA-02:27). [MERGED]
A buffer overflow in the resolver, which could be @@ -1702,7 +1702,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED]
@@ -1712,7 +1712,7 @@ "REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1725,7 +1725,7 @@ the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1736,7 +1736,7 @@ used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1772,7 +1772,7 @@ "REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1779,13 +1779,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1792,7 +1792,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1811,13 +1811,13 @@ "REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
Index: releases/5.0R/DP2/relnotes-ia64.html =================================================================== --- releases/5.0R/DP2/relnotes-ia64.html +++ releases/5.0R/DP2/relnotes-ia64.html @@ -1446,7 +1446,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -1464,7 +1464,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Bugs in the TCP SYN cache (``syncache'') and SYN @@ -1472,7 +1472,7 @@ legitimate TCP/IP traffic to crash a machine, have been fixed. For a workaround and patches, see security advisory FreeBSD-SA-02:20. [MERGED]
A routing table memory leak, which could allow a @@ -1479,13 +1479,13 @@ remote attacker to exhaust the memory of a target machine, has been fixed. A workaround and patches can be found in security advisory FreeBSD-SA-02:21. [MERGED]
A bug with memory-mapped I/O, which could cause a system crash, has been fixed. For more information about a solution, see security advisory FreeBSD-SA-02:22. [MERGED]
A security hole, in which SUID programs could be made @@ -1493,7 +1493,7 @@ manipulation of their standard I/O file descriptors, has been fixed. Information regarding a solution can be found in security advisory FreeBSD-SA-02:23. [MERGED]
Some unexpected behavior could be allowed with FreeBSD-SA-02:24. [MERGED]
Multiple vulnerabilities were found in the bzip2. For more information, see security advisory FreeBSD-SA-02:25. [MERGED]
A bug has been fixed in the implementation of the TCP @@ -1538,7 +1538,7 @@ "REFENTRYTITLE">accept_filter(9)) were in use. This bug has been fixed; for more information, see security advisory FreeBSD-SA-02:26. [MERGED]
Due to a bug in /tmp/.X11-unix does not exist and the system can be made to reboot. This bug has been corrected (see security advisory FreeBSD-SA-02:27). [MERGED]
A buffer overflow in the resolver, which could be @@ -1557,7 +1557,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED]
@@ -1567,7 +1567,7 @@ "REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1580,7 +1580,7 @@ the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1591,7 +1591,7 @@ used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1627,7 +1627,7 @@ "REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1634,13 +1634,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1647,7 +1647,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1666,13 +1666,13 @@ "REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
Index: releases/5.0R/DP2/relnotes-pc98.html =================================================================== --- releases/5.0R/DP2/relnotes-pc98.html +++ releases/5.0R/DP2/relnotes-pc98.html @@ -1515,7 +1515,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -1533,7 +1533,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Bugs in the TCP SYN cache (``syncache'') and SYN @@ -1541,7 +1541,7 @@ legitimate TCP/IP traffic to crash a machine, have been fixed. For a workaround and patches, see security advisory FreeBSD-SA-02:20. [MERGED]
A routing table memory leak, which could allow a @@ -1548,13 +1548,13 @@ remote attacker to exhaust the memory of a target machine, has been fixed. A workaround and patches can be found in security advisory FreeBSD-SA-02:21. [MERGED]
A bug with memory-mapped I/O, which could cause a system crash, has been fixed. For more information about a solution, see security advisory FreeBSD-SA-02:22. [MERGED]
A security hole, in which SUID programs could be made @@ -1562,7 +1562,7 @@ manipulation of their standard I/O file descriptors, has been fixed. Information regarding a solution can be found in security advisory FreeBSD-SA-02:23. [MERGED]
Some unexpected behavior could be allowed with FreeBSD-SA-02:24. [MERGED]
Multiple vulnerabilities were found in the bzip2. For more information, see security advisory FreeBSD-SA-02:25. [MERGED]
A bug has been fixed in the implementation of the TCP @@ -1607,7 +1607,7 @@ "REFENTRYTITLE">accept_filter(9)) were in use. This bug has been fixed; for more information, see security advisory FreeBSD-SA-02:26. [MERGED]
Due to a bug in /tmp/.X11-unix does not exist and the system can be made to reboot. This bug has been corrected (see security advisory FreeBSD-SA-02:27). [MERGED]
A buffer overflow in the resolver, which could be @@ -1626,7 +1626,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED]
@@ -1636,7 +1636,7 @@ "REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1649,7 +1649,7 @@ the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1660,7 +1660,7 @@ used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1696,7 +1696,7 @@ "REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1703,13 +1703,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1716,7 +1716,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1735,13 +1735,13 @@ "REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
Index: releases/5.0R/DP2/relnotes-sparc64.html =================================================================== --- releases/5.0R/DP2/relnotes-sparc64.html +++ releases/5.0R/DP2/relnotes-sparc64.html @@ -1470,7 +1470,7 @@ malicious SSH server to execute arbitrary code on the client system with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) [MERGED]A programming error in zlib @@ -1488,7 +1488,7 @@ incorrectly or abort. This zlib bug has been fixed. For a workaround and solutions, see security advisory FreeBSD-SA-02:18. [MERGED]
Bugs in the TCP SYN cache (``syncache'') and SYN @@ -1496,7 +1496,7 @@ legitimate TCP/IP traffic to crash a machine, have been fixed. For a workaround and patches, see security advisory FreeBSD-SA-02:20. [MERGED]
A routing table memory leak, which could allow a @@ -1503,13 +1503,13 @@ remote attacker to exhaust the memory of a target machine, has been fixed. A workaround and patches can be found in security advisory FreeBSD-SA-02:21. [MERGED]
A bug with memory-mapped I/O, which could cause a system crash, has been fixed. For more information about a solution, see security advisory FreeBSD-SA-02:22. [MERGED]
A security hole, in which SUID programs could be made @@ -1517,7 +1517,7 @@ manipulation of their standard I/O file descriptors, has been fixed. Information regarding a solution can be found in security advisory FreeBSD-SA-02:23. [MERGED]
Some unexpected behavior could be allowed with FreeBSD-SA-02:24. [MERGED]
Multiple vulnerabilities were found in the bzip2. For more information, see security advisory FreeBSD-SA-02:25. [MERGED]
A bug has been fixed in the implementation of the TCP @@ -1562,7 +1562,7 @@ "REFENTRYTITLE">accept_filter(9)) were in use. This bug has been fixed; for more information, see security advisory FreeBSD-SA-02:26. [MERGED]
Due to a bug in /tmp/.X11-unix does not exist and the system can be made to reboot. This bug has been corrected (see security advisory FreeBSD-SA-02:27). [MERGED]
A buffer overflow in the resolver, which could be @@ -1581,7 +1581,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED]
@@ -1591,7 +1591,7 @@ "REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1604,7 +1604,7 @@ the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1615,7 +1615,7 @@ used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1651,7 +1651,7 @@ "REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1658,13 +1658,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1671,7 +1671,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1690,13 +1690,13 @@ "REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
Index: releases/5.0R/errata.html =================================================================== --- releases/5.0R/errata.html +++ releases/5.0R/errata.html @@ -79,8 +79,8 @@For a list of all FreeBSD CERT security advisories, see http://www.FreeBSD.org/security/ or ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/.
+ href="https://security.FreeBSD.org/" + target="_top">https://security.FreeBSD.org/.A timing-based attack on OpenSSL 0.9.6i. See security advisory FreeBSD-SA-03:02 for more details.
It may be possible to recover the shared secret key used @@ -113,7 +113,7 @@ reduces its effectiveness in dealing with TCP SYN flood denial-of-service attacks. Workaround information and fixes are given in security advisory FreeBSD-SA-03:03.
Due to buffer overflows in header parsing in root. More information, including pointers to patches, can be found in security advisories FreeBSD-SA-03:04 and FreeBSD-SA-03:07.
The XDR encoder/decoder does incorrect bounds-checking, @@ -135,7 +135,7 @@ which could allow a remote attacker to cause a denial-of-service. For bugfix information, see security advisory FreeBSD-SA-03:05.
OpenSSL has been found @@ -142,7 +142,7 @@ vulnerable to two recently-disclosed attacks. Information on workarounds and patches for supported security branches is contained in security advisory FreeBSD-SA-03:06.
Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1292,7 +1292,7 @@ class="REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1299,13 +1299,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1312,7 +1312,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1331,13 +1331,13 @@ class="REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
A file descriptor leak in the FreeBSD-SA-02:44. [MERGED]
Index: releases/5.0R/relnotes-i386.html =================================================================== --- releases/5.0R/relnotes-i386.html +++ releases/5.0R/relnotes-i386.html @@ -1353,7 +1353,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED] @@ -1363,7 +1363,7 @@ class="REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1376,7 +1376,7 @@ information that the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1387,7 +1387,7 @@ could be used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1423,7 +1423,7 @@ class="REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1430,13 +1430,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1443,7 +1443,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1462,13 +1462,13 @@ class="REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
A file descriptor leak in the FreeBSD-SA-02:44. [MERGED]
Index: releases/5.0R/relnotes-ia64.html =================================================================== --- releases/5.0R/relnotes-ia64.html +++ releases/5.0R/relnotes-ia64.html @@ -1175,7 +1175,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED] @@ -1185,7 +1185,7 @@ class="REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1198,7 +1198,7 @@ information that the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1209,7 +1209,7 @@ could be used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1245,7 +1245,7 @@ class="REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1252,13 +1252,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1265,7 +1265,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1284,13 +1284,13 @@ class="REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
A file descriptor leak in the FreeBSD-SA-02:44. [MERGED]
Index: releases/5.0R/relnotes-pc98.html =================================================================== --- releases/5.0R/relnotes-pc98.html +++ releases/5.0R/relnotes-pc98.html @@ -1283,7 +1283,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED] @@ -1293,7 +1293,7 @@ class="REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1306,7 +1306,7 @@ information that the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1317,7 +1317,7 @@ could be used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1353,7 +1353,7 @@ class="REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1360,13 +1360,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1373,7 +1373,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1392,13 +1392,13 @@ class="REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
A file descriptor leak in the FreeBSD-SA-02:44. [MERGED]
Index: releases/5.0R/relnotes-sparc64.html =================================================================== --- releases/5.0R/relnotes-sparc64.html +++ releases/5.0R/relnotes-sparc64.html @@ -1201,7 +1201,7 @@ exploited by a malicious domain name server or an attacker forging DNS messages, has been fixed. See security advisory FreeBSD-SA-02:28 for more details. [MERGED] @@ -1211,7 +1211,7 @@ class="REFENTRYTITLE">tcpdump(1), which could be triggered by badly-formed NFS packets, has been fixed. See security advisory FreeBSD-SA-02:29 for more details. [MERGED] @@ -1224,7 +1224,7 @@ information that the process could have obtained before abandoning its privileges. For a discussion of this issue, see security advisory FreeBSD-SA-02:30 for more details. [MERGED] @@ -1235,7 +1235,7 @@ could be used to change the permissions of an arbitrary file, has been corrected. For more information, see security advisory FreeBSD-SA-02:32. [MERGED]Multiple buffer overflows in OpenSSL. More details can be found in security advisory FreeBSD-SA-02:33. [MERGED]
A heap buffer overflow in the XDR decoder has been fixed. For more details, see security advisory FreeBSD-SA-02:34. [MERGED]
A bug that could allow local users to read and write arbitrary blocks on an FFS filesystem has been corrected. More details can be found in security advisory FreeBSD-SA-02:35. [MERGED]
A bug in the NFS server code, which could allow a remote denial of service attack, has been fixed. Security advisory FreeBSD-SA-02:36 has more details. [MERGED]
@@ -1271,7 +1271,7 @@ class="REFENTRYTITLE">kqueue(2) mechanism has been fixed. More information is contained in security advisory FreeBSD-SA-02:37. [MERGED]Several bounds-checking bugs in system calls, which @@ -1278,13 +1278,13 @@ could result in some system calls returning a large portion of kernel memory, have been fixed. More information can be found in security advisory FreeBSD-SA-02:38. [MERGED]
A bug that could allow applications using libkvm to leak sensitive file descriptors has been corrected. (See security advisory FreeBSD-SA-02:39 for more details.) [MERGED]
@@ -1291,7 +1291,7 @@Buffer overflows in kadmind(8) and k5admin have been corrected. More details can be found in security advisory FreeBSD-SA-02:40. [MERGED]
Errors in smrsh(8), which could allow users to circumvent restrictions on what programs can be executed, have been fixed. See FreeBSD-SA-02:41 for details. [MERGED]
@@ -1310,13 +1310,13 @@ class="REFENTRYTITLE">resolver(3), which could cause some applications to fail, have been corrected. More details are in FreeBSD-SA-02:42. [MERGED]Multiple vulnerabilities in BIND have been fixed, as described in FreeBSD-SA-02:43. [MERGED]
A file descriptor leak in the FreeBSD-SA-02:44. [MERGED]