version 1.356, 2001/10/22 22:21:56 |
version 1.357, 2001/11/13 17:25:48 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<a name=hosts> |
|
<li><font color=#009000><strong>001: INSTALL ISSUE: November 12, 2001</strong></font><br> |
|
A small bug in the installation script causes the <tt>/etc/hosts</tt> file to |
|
be incorrectly formed.<br> |
|
The resulting file contains a line which reads like:<p> |
|
<tt> |
|
#.#.#.# hostname. hostname |
|
</tt> |
|
<p> |
|
This line should actually read something like:<p> |
|
<tt> |
|
#.#.#.# hostname.domainname.com hostname |
|
</tt> |
|
<p> |
|
To correct this problem, simply edit the file and insert the domainname in |
|
the required place. |
|
<p> |
|
<a name=sshd> |
|
<li><font color=#009000><strong>002: SECURITY FIX: November 12, 2001</strong></font><br> |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&sektion=8">sshd(8)</a> |
|
is being upgraded from OpenSSH 3.0 to OpenSSH 3.0.1 to fix a few problems: |
|
<p> |
|
<ul> |
|
<li>A security hole that may allow an attacker to partially authenticate |
|
if -- and only if -- the administrator has enabled KerberosV. |
|
<br> |
|
By default, OpenSSH KerberosV support only becomes active after KerberosV |
|
has been properly configured. |
|
<p> |
|
<li>An excessive memory clearing bug (which we believe to be unexploitable) |
|
also exists, but since this may cause daemon crashes, we are providing a |
|
patch as well. |
|
<p> |
|
<li>Various other non-critical fixes. |
</ul> |
</ul> |
<p> |
<p> |
|
Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.1, |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/002_ssh.patch">a source code patch exists which remedies these problems</a>. |
|
<p> |
|
</ul> |
|
<p> |
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color=#e00000>i386</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<a name=hifn> |
|
<li><font color=#009000><strong>004: RELIABILITY FIX: November 12, 2001</strong></font> |
|
<br> |
|
Hifn7751 based cards may stop working on certain motherboards due to |
|
DMA errors. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/i386/004_hifn.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=alpha></a> |
<a name=alpha></a> |
|
|
<a name=sparc64></a> |
<a name=sparc64></a> |
<li><h3><font color=#e00000>sparc64</font></h3> |
<li><h3><font color=#e00000>sparc64</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<a name=sparc64cd></a> |
|
<li><font color=#009000><strong>003: RELIABILITY FIX: November 12, 2001</strong></font> |
|
<br> |
|
Access to a CD drive on the PCI ultrasparc machines results in a continuous stream |
|
of bogus interrupt messages, causing great user anguish. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/sparc64/003_sparc64cd.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=amiga></a> |
<a name=amiga></a> |
|
|
<a name=macppc></a> |
<a name=macppc></a> |
<li><h3><font color=#e00000>macppc</font></h3> |
<li><h3><font color=#e00000>macppc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<a name=altivec></a> |
|
<li><font color=#009000><strong>005: RELIABILITY FIX: November 12, 2001</strong></font> |
|
<br> |
|
Execution of Altivec instructions will crash the kernel. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/macppc/005_altivec.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=vax></a> |
<a name=vax></a> |