Regen from errata/article.html 1.69.2.32.

This commit is contained in:
Bruce A. Mah 2006-02-05 20:47:04 +00:00
parent 9623f7ab1b
commit c12eebcc3c
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=27044

View file

@ -20,7 +20,7 @@ alink="#0000FF">
FreeBSD Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.69.2.31 2006/01/25 10:39:02 simon Exp $<br />
1.69.2.32 2006/02/05 20:45:04 bmah Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -109,21 +109,21 @@ target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/</a>.</p>
<tr>
<td><a href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc"
target="_top">06:07.pf</a></td>
<td>25&nbsp;Janurary&nbsp;2006</td>
<td>25&nbsp;January&nbsp;2006</td>
<td>
<p>IP fragment handling panic in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=pf&sektion=4&manpath=FreeBSD+5.3-stable"><span
class="CITEREFENTRY"><span class="REFENTRYTITLE">pf</span>(4)</span></a></p>
href="http://www.FreeBSD.org/cgi/man.cgi?query=pf&amp;sektion=4&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">pf</span>(4)</span></a></p>
</td>
</tr>
<tr>
<td><a href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc"
target="_top">06:03.cpio</a></td>
<td>11&nbsp;Janurary&nbsp;2006</td>
<td>11&nbsp;January&nbsp;2006</td>
<td>
<p>Multiple vulnerabilities in <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=cpio&sektion=1&manpath=FreeBSD+5.3-stable">
href="http://www.FreeBSD.org/cgi/man.cgi?query=cpio&amp;sektion=1&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">cpio</span>(1)</span></a></p>
</td>
</tr>
@ -131,12 +131,12 @@ href="http://www.FreeBSD.org/cgi/man.cgi?query=cpio&sektion=1&manpath=FreeBSD+5.
<tr>
<td><a href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:02.ee.asc"
target="_top">06:02.eex</a></td>
<td>11&nbsp;Janurary&nbsp;2006</td>
<td>11&nbsp;January&nbsp;2006</td>
<td>
<p><a
href="http://www.FreeBSD.org/cgi/man.cgi?query=ee&sektion=1&manpath=FreeBSD+5.3-stable"><span
class="CITEREFENTRY"><span class="REFENTRYTITLE">ee</span>(1)</span></a> temporary file
privilege escalation</p>
href="http://www.FreeBSD.org/cgi/man.cgi?query=ee&amp;sektion=1&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">ee</span>(1)</span></a> temporary
file privilege escalation</p>
</td>
</tr>
@ -144,7 +144,7 @@ privilege escalation</p>
<td><a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:01.texindex.asc"
target="_top">06:01.texindex</a></td>
<td>11&nbsp;Janurary&nbsp;2006</td>
<td>11&nbsp;January&nbsp;2006</td>
<td>
<p>Texindex temporary file privilege escalation</p>
</td>
@ -262,15 +262,15 @@ target="_top">SA-05:19.ipsec</a></td>
<p>(6 May 2005) An error in the default permissions on the <tt
class="FILENAME">/dev/iir</tt> device node, which allowed unprivileged local users to
send commands to the hardware supported by the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=iir&sektion=4&manpath=FreeBSD+5.3-stable"><span
class="CITEREFENTRY"><span class="REFENTRYTITLE">iir</span>(4)</span></a> driver.
href="http://www.FreeBSD.org/cgi/man.cgi?query=iir&amp;sektion=4&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">iir</span>(4)</span></a> driver.
Although the error was fixed prior to 5.4-RELEASE, it was applied too late in the release
cycle to be mentioned in the release notes. For more information, see security advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:06.iir.asc"
target="_top">FreeBSD-SA-05:06.iir</a>.</p>
<p>(6 May 2005) A bug in the validation of <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=i386_get_ldt&sektion=2&manpath=FreeBSD+5.3-stable">
href="http://www.FreeBSD.org/cgi/man.cgi?query=i386_get_ldt&amp;sektion=2&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">i386_get_ldt</span>(2)</span></a>
system call input arguments, which may allow kernel memory may be disclosed to the user
process, has been fixed. This bug was fixed prior to 5.4-RELEASE, although not in time to
@ -289,7 +289,7 @@ FreeBSD/sparc64 GENERIC kernel prior to the upcoming 6.0-RELEASE officially only
serial consoles. This is especially true for the FreeBSD/sparc64 5.4-RELEASE GENERIC
kernel because the ofw_console(4) driver which also provides limited indirect support for
graphical consoles has been replaced with the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=uart&sektion=4&manpath=FreeBSD+5.3-stable">
href="http://www.FreeBSD.org/cgi/man.cgi?query=uart&amp;sektion=4&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">uart</span>(4)</span></a> driver
in favor better serial support.</p>