2 Security Advisories

The following security advisories pertain to FreeBSD 4.11-RELEASE. For more information, consult the individual advisories available from http://security.FreeBSD.org/advisories/.

Advisory Date Topic
SA-05:01.telnet 28 March 2005

telnet client buffer overflows

SA-05:02.sendfile 4 April 2005

sendfile kernel memory disclosure

SA-05:04.ifconf 15 April 2005

Kernel memory disclosure in ifconf()

SA-05:05.cvs 22 April 2005

Multiple vulnerabilities in CVS

SA-05:06.iir 6 May 2005

Incorrect permissions on /dev/iir

SA-05:07.ldt 6 May 2005

Local kernel memory disclosure in i386_get_ldt

SA-05:08.kmem 6 May 2005

Local kernel memory disclosure

SA-05:09.htt 13 May 2005

information disclosure when using HTT

SA-05:11.gzip 9 June 2005

gzip directory traversal and permission race vulnerabilities

SA-05:14.bzip2 29 June 2005

bzip2 denial of service and permission race vulnerabilities

SA-05:15.tcp 29 June 2005

TCP connection stall denial of service

SA-06:16.smbfs 31 May 2006

smbfs chroot escape

SA-06:17.sendmail 14 June 2006

Incorrect multipart message handling in Sendmail

SA-06:18.ppp 23 August 2006

Buffer overflow in sppp(4)

SA-06:19.openssl 06 September 2006

Incorrect PKCS#1 v1.5 padding validation in crypto(3)

SA-06:21.gzip 19 September 2006

Multiple vulnerabilities in gzip(1)

SA-06:22.openssh 30 September 2006

Multiple vulnerabilities in OpenSSH

SA-06:23.openssl 28 September 2006

Multiple problems in crypto(3)

SA-06:25.kmem 6 December 2006

Kernel memory disclosure in firewire(4)

SA-06:26.gtar 6 December 2006

gtar(1) name mangling symlink vulnerability

This file, and other release-related documents, can be downloaded from http://snapshots.jp.FreeBSD.org/.

For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

All users of FreeBSD 4-STABLE should subscribe to the <stable@FreeBSD.org> mailing list.

For questions about this documentation, e-mail <doc@FreeBSD.org>.