PERFORCE change 98874 for review
soc-andrew
soc-andrew at FreeBSD.org
Fri Jun 9 17:04:33 UTC 2006
http://perforce.freebsd.org/chv.cgi?CH=98874
Change 98874 by soc-andrew at soc-andrew_serv on 2006/06/09 17:01:45
IFC
Affected files ...
.. //depot/projects/soc2005/bsdinstaller/src/release/Makefile#50 integrate
.. //depot/projects/soc2005/bsdinstaller/src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml#17 integrate
Differences ...
==== //depot/projects/soc2005/bsdinstaller/src/release/Makefile#50 (text+ko) ====
@@ -1,4 +1,4 @@
-# $FreeBSD: src/release/Makefile,v 1.910 2006/05/16 14:22:37 nyan Exp $
+# $FreeBSD: src/release/Makefile,v 1.911 2006/06/09 03:40:04 cperciva Exp $
#
# make release [BUILDNAME=somename] CHROOTDIR=/some/dir CVSROOT=/cvs/dir \
# [RELEASETAG=tag]
@@ -655,7 +655,7 @@
# Remove all the directories we don't need.
-cd ${RD}/trees && \
(find ${OTHER_DISTS} -path '*/var/empty' | xargs chflags noschg; \
- find ${OTHER_DISTS} -depth -type d -print | xargs rmdir)
+ find ${OTHER_DISTS} -depth -type d -empty -print | xargs rmdir)
touch ${.TARGET}
#
@@ -823,6 +823,10 @@
# Add the kernel
@cp -Rp ${RD}/kernels/GENERIC/ ${RD}/bsdinstaller/root/boot/kernel
+ # Hack until I rebuild the ports
+ @cp ${RD}/bsdinstaller/root/lib/libc.so.7 ${RD}/bsdinstaller/root/lib/libc.so.6
+ @cp ${RD}/bsdinstaller/root/lib/libutil.so.6 ${RD}/bsdinstaller/root/lib/libutil.so.5
+
# Add the required libs to the installer's tree
@cd ${.CURDIR} && $(MAKE) installPackage PACKAGE=libaura \
ROOT=${RD}/bsdinstaller/root
==== //depot/projects/soc2005/bsdinstaller/src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml#17 (text+ko) ====
@@ -3,7 +3,7 @@
<corpauthor>The &os; Project</corpauthor>
- <pubdate>$FreeBSD: src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml,v 1.936 2006/05/27 14:26:49 bmah Exp $</pubdate>
+ <pubdate>$FreeBSD: src/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml,v 1.938 2006/05/31 23:49:51 bmah Exp $</pubdate>
<copyright>
<year>2000</year>
@@ -118,67 +118,79 @@
could allow a local attacker to overwrite files in the context
of a user running the &man.texindex.1; utility, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:01.texindex.asc">FreeBSD-SA-06:01.texindex</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:01.texindex.asc">FreeBSD-SA-06:01.texindex</ulink>. &merged;</para>
<para>A temporary file vulnerability in the &man.ee.1; text
editor, which could allow a local attacker to overwrite files in
the context of a user running &man.ee.1;, has been fixed. For
more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:02.ee.asc">FreeBSD-SA-06:02.ee</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:02.ee.asc">FreeBSD-SA-06:02.ee</ulink>. &merged;</para>
<para>Several vulnerabilities in the &man.cpio.1; utility have
been corrected. For more
details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc">FreeBSD-SA-06:03.cpio</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:03.cpio.asc">FreeBSD-SA-06:03.cpio</ulink>. &merged;</para>
<para>An error in &man.ipfw.4; IP fragment handling, which could
cause a crash, has been fixed. For more
details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc">FreeBSD-SA-06:04.ipfw</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:04.ipfw.asc">FreeBSD-SA-06:04.ipfw</ulink>. &merged;</para>
<para>A potential buffer overflow in the IEEE 802.11 scanning code
has been corrected. For more
details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:05.80211.asc">FreeBSD-SA-06:05.80211</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:05.80211.asc">FreeBSD-SA-06:05.80211</ulink>. &merged;</para>
<para>Two instances in which portions of kernel memory could be
disclosed to users have been fixed. For more details see
security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc">FreeBSD-SA-06:06.kmem</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:06.kmem.asc">FreeBSD-SA-06:06.kmem</ulink>. &merged;</para>
<para>A logic bug in the IP fragment handling in &man.pf.4;, which
could cause a crash under certain circumstances, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc">FreeBSD-SA-06:07.pf</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:07.pf.asc">FreeBSD-SA-06:07.pf</ulink>. &merged;</para>
<para>A logic bug in the NFS server code, which could cause a crash when
the server received a message with a zero-length payload, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:10.nfs.asc">FreeBSD-SA-06:10.nfs</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:10.nfs.asc">FreeBSD-SA-06:10.nfs</ulink>. &merged;</para>
<para>A programming error in the &man.fast.ipsec.4; implementation
results in the sequence number associated with a Security
Association not being updated, allowing packets to unconditionally
pass sequence number verification checks, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:11.ipsec.asc">FreeBSD-SA-06:11.ipsec</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:11.ipsec.asc">FreeBSD-SA-06:11.ipsec</ulink>. &merged;</para>
<para>A logic bug that could cause &man.opiepasswd.1; to allow an unprivileged
user to configure OPIE authentication for the root user under certain
circumstances, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:12.opie.asc">FreeBSD-SA-06:12.opie</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:12.opie.asc">FreeBSD-SA-06:12.opie</ulink>. &merged;</para>
<para>An asynchronous signal handling vulnerability in &man.sendmail.8;,
which could allow a remote attacker to execute arbitrary code with the
privileges of the user running sendmail, typically root, has been fixed.
For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc">FreeBSD-SA-06:13.sendmail</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:13.sendmail.asc">FreeBSD-SA-06:13.sendmail</ulink>. &merged;</para>
<para arch="i386,amd64">An information disclosure issue found in the
&os; kernel running on 7th- and 8th-generation AMD processors
has been fixed. For more details see security advisory <ulink
- url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc">FreeBSD-SA-06:14.fpu</ulink>. &merged;</para>
+ url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:14.fpu.asc">FreeBSD-SA-06:14.fpu</ulink>. &merged;</para>
+
+ <para>A bug in &man.ypserv.8;, which effectively disabled the
+ <filename>/var/yp/securenets</filename> access control mechanism,
+ has been corrected. More details are available in security
+ advisory
+ <ulink url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:15.ypserv.asc">FreeBSD-SA-06:15.ypserv</ulink>. &merged;</para>
+
+ <para>A bug in the smbfs file system, which could allow an
+ attacker to escape out of &man.chroot.2 environments on an smbfs
+ mounted filesystem, has been fixed. For more details, see
+ security advisory
+ <ulink url="http://security.FreeBSD.org/advisories/FreeBSD-SA-06:16.smbfs.asc">FreeBSD-SA-06:16.smbfs</ulink>. &merged;</para>
</sect2>
More information about the p4-projects
mailing list