version 1.298, 2000/12/19 20:43:50 |
version 1.299, 2000/12/22 18:54:11 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=xlock></a> |
|
<li><font color=#009000><strong>014: SECURITY FIX: Dec 22, 2000</strong></font><br> |
|
Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">A source code patch exists which remedies the problem.</a> |
|
<p> |
|
In addition to a source code patch, new xlock binaries have been created for each architecture listed below. Place these binaries at <i>/usr/X11R6/bin/xlock</i> |
|
and <i>chmod 4755 /usr/X11R6/bin/xlock</i>. |
|
<p> |
|
<ul> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/xlock">Xlock - i386</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/xlock">Xlock - sparc</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mac68k/xlock">Xlock - mac68k</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/xlock">Xlock - powerpc</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/amiga/xlock">Xlock - amiga</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/hp300/xlock">Xlock - hp300</a> |
|
<li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a> |
|
</ul> |
|
<p> |
<a name=procfs></a> |
<a name=procfs></a> |
<li><font color=#009000><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br> |
<li><font color=#009000><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br> |
|
|
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color=#e00000>i386</font></h3> |
<ul> |
<ul> |
|
<a name=pms></a> |
|
<li><font color=#009000><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br> |
|
Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">A source code patch exists which remedies this problem.</a> |
|
<p> |
<a name=pcibios></a> |
<a name=pcibios></a> |
<li><font color=#009000><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br> |
<li><font color=#009000><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br> |
On some machines, a PCIBIOS device driver interrupt allocation bug can cause a |
On some machines, a PCIBIOS device driver interrupt allocation bug can cause a |