PERFORCE change 98874 for review

soc-andrew soc-andrew at FreeBSD.org
Fri Jun 9 17:04:33 UTC 2006


http://perforce.freebsd.org/chv.cgi?CH=98874

Change 98874 by soc-andrew at soc-andrew_serv on 2006/06/09 17:01:45

	IFC

Affected files ...

.. //depot/projects/soc2005/bsdinstaller/src/release/Makefile#50 integrate
.. //depot/projects/soc2005/bsdinstaller/src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml#17 integrate

Differences ...

==== //depot/projects/soc2005/bsdinstaller/src/release/Makefile#50 (text+ko) ====

@@ -1,4 +1,4 @@
-# $FreeBSD: src/release/Makefile,v 1.910 2006/05/16 14:22:37 nyan Exp $
+# $FreeBSD: src/release/Makefile,v 1.911 2006/06/09 03:40:04 cperciva Exp $
 #
 # make release [BUILDNAME=somename] CHROOTDIR=/some/dir CVSROOT=/cvs/dir \
 #     [RELEASETAG=tag]
@@ -655,7 +655,7 @@
 	# Remove all the directories we don't need.
 	-cd ${RD}/trees && \
 		(find ${OTHER_DISTS} -path '*/var/empty' | xargs chflags noschg; \
-		find ${OTHER_DISTS} -depth -type d -print | xargs rmdir)
+		find ${OTHER_DISTS} -depth -type d -empty -print | xargs rmdir)
 	touch ${.TARGET}
 
 #
@@ -823,6 +823,10 @@
 	# Add the kernel
 	@cp -Rp ${RD}/kernels/GENERIC/ ${RD}/bsdinstaller/root/boot/kernel
 
+	# Hack until I rebuild the ports
+	@cp ${RD}/bsdinstaller/root/lib/libc.so.7 ${RD}/bsdinstaller/root/lib/libc.so.6
+	@cp ${RD}/bsdinstaller/root/lib/libutil.so.6 ${RD}/bsdinstaller/root/lib/libutil.so.5
+
 	# Add the required libs to the installer's tree
 	@cd ${.CURDIR} && $(MAKE) installPackage PACKAGE=libaura \
 		ROOT=${RD}/bsdinstaller/root

==== //depot/projects/soc2005/bsdinstaller/src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml#17 (text+ko) ====

@@ -3,7 +3,7 @@
 
   <corpauthor>The &os; Project</corpauthor>
 
-  <pubdate>$FreeBSD: src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml,v 1.936 2006/05/27 14:26:49 bmah Exp $</pubdate>
+  <pubdate>$FreeBSD: src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml,v 1.938 2006/05/31 23:49:51 bmah Exp $</pubdate>
 
   <copyright>
     <year>2000</year>
@@ -118,67 +118,79 @@
       could allow a local attacker to overwrite files in the context
       of a user running the &man.texindex.1; utility, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:01.texindex.asc">FreeBSD-SA-06:01.texindex</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:01.texindex.asc">FreeBSD-SA-06:01.texindex</ulink>. &merged;</para>
 
     <para>A temporary file vulnerability in the &man.ee.1; text
       editor, which could allow a local attacker to overwrite files in
       the context of a user running &man.ee.1;, has been fixed.  For
       more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:02.ee.asc">FreeBSD-SA-06:02.ee</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:02.ee.asc">FreeBSD-SA-06:02.ee</ulink>. &merged;</para>
 
     <para>Several vulnerabilities in the &man.cpio.1; utility have
       been corrected.  For more
       details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc">FreeBSD-SA-06:03.cpio</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:03.cpio.asc">FreeBSD-SA-06:03.cpio</ulink>. &merged;</para>
 
     <para>An error in &man.ipfw.4; IP fragment handling, which could
       cause a crash, has been fixed.  For more
       details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc">FreeBSD-SA-06:04.ipfw</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:04.ipfw.asc">FreeBSD-SA-06:04.ipfw</ulink>. &merged;</para>
 
     <para>A potential buffer overflow in the IEEE 802.11 scanning code
       has been corrected.  For more
       details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:05.80211.asc">FreeBSD-SA-06:05.80211</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:05.80211.asc">FreeBSD-SA-06:05.80211</ulink>. &merged;</para>
 
     <para>Two instances in which portions of kernel memory could be
       disclosed to users have been fixed.  For more details see
       security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc">FreeBSD-SA-06:06.kmem</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:06.kmem.asc">FreeBSD-SA-06:06.kmem</ulink>. &merged;</para>
 
     <para>A logic bug in the IP fragment handling in &man.pf.4;, which
       could cause a crash under certain circumstances, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc">FreeBSD-SA-06:07.pf</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:07.pf.asc">FreeBSD-SA-06:07.pf</ulink>. &merged;</para>
 
     <para>A logic bug in the NFS server code, which could cause a crash when
       the server received a message with a zero-length payload, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:10.nfs.asc">FreeBSD-SA-06:10.nfs</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:10.nfs.asc">FreeBSD-SA-06:10.nfs</ulink>. &merged;</para>
 
     <para>A programming error in the &man.fast.ipsec.4; implementation
       results in the sequence number associated with a Security
       Association not being updated, allowing packets to unconditionally
       pass sequence number verification checks, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:11.ipsec.asc">FreeBSD-SA-06:11.ipsec</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:11.ipsec.asc">FreeBSD-SA-06:11.ipsec</ulink>. &merged;</para>
 
     <para>A logic bug that could cause &man.opiepasswd.1; to allow an unprivileged
       user to configure OPIE authentication for the root user under certain
       circumstances, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:12.opie.asc">FreeBSD-SA-06:12.opie</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:12.opie.asc">FreeBSD-SA-06:12.opie</ulink>. &merged;</para>
 
     <para>An asynchronous signal handling vulnerability in &man.sendmail.8;,
       which could allow a remote attacker to execute arbitrary code with the
       privileges of the user running sendmail, typically root, has been fixed.
       For more details see security advisory <ulink
-      url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc">FreeBSD-SA-06:13.sendmail</ulink>. &merged;</para>
+      url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:13.sendmail.asc">FreeBSD-SA-06:13.sendmail</ulink>. &merged;</para>
 
     <para arch="i386,amd64">An information disclosure issue found in the
       &os; kernel running on 7th- and 8th-generation AMD processors
       has been fixed.  For more details see security advisory <ulink
-       url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc">FreeBSD-SA-06:14.fpu</ulink>. &merged;</para>
+       url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:14.fpu.asc">FreeBSD-SA-06:14.fpu</ulink>. &merged;</para>
+
+    <para>A bug in &man.ypserv.8;, which effectively disabled the
+      <filename>/var/yp/securenets</filename> access control mechanism,
+      has been corrected.  More details are available in security
+      advisory
+      <ulink url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:15.ypserv.asc">FreeBSD-SA-06:15.ypserv</ulink>. &merged;</para>
+
+    <para>A bug in the smbfs file system, which could allow an
+      attacker to escape out of &man.chroot.2 environments on an smbfs
+      mounted filesystem, has been fixed.  For more details, see
+      security advisory
+      <ulink url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:16.smbfs.asc">FreeBSD-SA-06:16.smbfs</ulink>. &merged;</para>
 
   </sect2>
 


More information about the p4-projects mailing list