From c12eebcc3ca34a4df38ab57533bd1ef870f4e664 Mon Sep 17 00:00:00 2001
From: "Bruce A. Mah"
$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
-1.69.2.31 2006/01/25 10:39:02 simon Exp $
+1.69.2.32 2006/02/05 20:45:04 bmah Exp $
IP fragment handling panic in pf(4)
+href="http://www.FreeBSD.org/cgi/man.cgi?query=pf&sektion=4&manpath=FreeBSD+5.3-stable"> +pf(4)Multiple vulnerabilities in +href="http://www.FreeBSD.org/cgi/man.cgi?query=cpio&sektion=1&manpath=FreeBSD+5.3-stable"> cpio(1)
ee(1) temporary file -privilege escalation
+href="http://www.FreeBSD.org/cgi/man.cgi?query=ee&sektion=1&manpath=FreeBSD+5.3-stable"> +ee(1) temporary +file privilege escalationTexindex temporary file privilege escalation
(6 May 2005) An error in the default permissions on the /dev/iir device node, which allowed unprivileged local users to send commands to the hardware supported by the iir(4) driver. +href="http://www.FreeBSD.org/cgi/man.cgi?query=iir&sektion=4&manpath=FreeBSD+5.3-stable"> +iir(4) driver. Although the error was fixed prior to 5.4-RELEASE, it was applied too late in the release cycle to be mentioned in the release notes. For more information, see security advisory FreeBSD-SA-05:06.iir.
(6 May 2005) A bug in the validation of +href="http://www.FreeBSD.org/cgi/man.cgi?query=i386_get_ldt&sektion=2&manpath=FreeBSD+5.3-stable"> i386_get_ldt(2) system call input arguments, which may allow kernel memory may be disclosed to the user process, has been fixed. This bug was fixed prior to 5.4-RELEASE, although not in time to @@ -289,7 +289,7 @@ FreeBSD/sparc64 GENERIC kernel prior to the upcoming 6.0-RELEASE officially only serial consoles. This is especially true for the FreeBSD/sparc64 5.4-RELEASE GENERIC kernel because the ofw_console(4) driver which also provides limited indirect support for graphical consoles has been replaced with the +href="http://www.FreeBSD.org/cgi/man.cgi?query=uart&sektion=4&manpath=FreeBSD+5.3-stable"> uart(4) driver in favor better serial support.