[Midnightbsd-cvs] www [641] trunk: fix version

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Sat Oct 3 14:28:05 EDT 2015


Revision: 641
          http://svnweb.midnightbsd.org/www/?rev=641
Author:   laffer1
Date:     2015-10-03 14:28:05 -0400 (Sat, 03 Oct 2015)
Log Message:
-----------
fix version

Modified Paths:
--------------
    trunk/index.html
    trunk/security/index.html

Modified: trunk/index.html
===================================================================
--- trunk/index.html	2015-10-03 18:25:23 UTC (rev 640)
+++ trunk/index.html	2015-10-03 18:28:05 UTC (rev 641)
@@ -84,9 +84,9 @@
 
 				<p class="update">0.7.1 RELEASE <br>
 					In rpcbind(8), netbuf structures are copied directly, which would result in
-										two netbuf structures that reference to one shared address buffer. When one
-										of the two netbuf structures is freed, access to the other netbuf structure
-										would result in an undefined result that may crash the rpcbind(8) daemon.
+					two netbuf structures that reference to one shared address buffer. When one
+					of the two netbuf structures is freed, access to the other netbuf structure
+					would result in an undefined result that may crash the rpcbind(8) daemon.
 				</p>
 
 				<p class="more">
@@ -97,21 +97,22 @@
 				<p class="date">August 25, 2015</p>
 
 				<p class="update">
-				kernel:
-									fix a security issue on amd64 where the GS segment CPU register can be changed via
-									userland value in kernel mode by using an IRET with #SS or #NP exceptions.
+					0.6.7 RELEASE <br>
+					kernel:
+					fix a security issue on amd64 where the GS segment CPU register can be changed via
+					userland value in kernel mode by using an IRET with #SS or #NP exceptions.
 					<br>
-							<br><b>openssh</b>:
-									A programming error in the privileged monitor process of the sshd(8)
-									service may allow the username of an already-authenticated user to be
-									overwritten by the unprivileged child process.
+					<br><b>openssh</b>:
+					A programming error in the privileged monitor process of the sshd(8)
+					service may allow the username of an already-authenticated user to be
+					overwritten by the unprivileged child process.
 					<br>
 					<br> A use-after-free error in the privileged monitor process of he sshd(8)
-									service may be deterministically triggered by the actions of a
-									compromised unprivileged child process.
+					service may be deterministically triggered by the actions of a
+					compromised unprivileged child process.
 					<br>
 					<br>A use-after-free error in the session multiplexing code in the sshd(8)
-									service may result in unintended termination of the connection.
+					service may result in unintended termination of the connection.
 				</p>
 
 				<p class="more"><a href="security/index.html#a20150825">Read more ...</a></p>

Modified: trunk/security/index.html
===================================================================
--- trunk/security/index.html	2015-10-03 18:25:23 UTC (rev 640)
+++ trunk/security/index.html	2015-10-03 18:28:05 UTC (rev 641)
@@ -46,6 +46,8 @@
 					two netbuf structures that reference to one shared address buffer. When one
 					of the two netbuf structures is freed, access to the other netbuf structure
 					would result in an undefined result that may crash the rpcbind(8) daemon.</p>
+
+				<p>10/2: Revised rpcbind(8) patch to fix issues with NIS</p>
 			</blockquote>
 
 			<blockquote class="bluebox" id="a20150825">
@@ -53,8 +55,7 @@
 					August 25, 2015
 				</h3>
 
-				<p>
-					0.6.7 RELEASE
+				<p>0.6.7 RELEASE
 
 				<p> kernel:
 					fix a security issue on amd64 where the GS segment CPU register can be changed via



More information about the Midnightbsd-cvs mailing list