[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.298 and 1.299

version 1.298, 2000/12/19 20:43:50 version 1.299, 2000/12/22 18:54:11
Line 45 
Line 45 
 <a name=all></a>  <a name=all></a>
 <li><h3><font color=#e00000>All architectures</font></h3>  <li><h3><font color=#e00000>All architectures</font></h3>
 <ul>  <ul>
   <a name=xlock></a>
   <li><font color=#009000><strong>014: SECURITY FIX: Dec 22, 2000</strong></font><br>
   Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">A source code patch exists which remedies the problem.</a>
   <p>
   In addition to a source code patch, new xlock binaries have been created for each architecture listed below. Place these binaries at <i>/usr/X11R6/bin/xlock</i>
    and <i>chmod 4755 /usr/X11R6/bin/xlock</i>.
   <p>
   <ul>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/xlock">Xlock - i386</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/xlock">Xlock - sparc</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mac68k/xlock">Xlock - mac68k</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/xlock">Xlock - powerpc</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/amiga/xlock">Xlock - amiga</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/hp300/xlock">Xlock - hp300</a>
   <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a>
   </ul>
   <p>
 <a name=procfs></a>  <a name=procfs></a>
 <li><font color=#009000><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br>  <li><font color=#009000><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>
Line 109 
Line 127 
 <a name=i386></a>  <a name=i386></a>
 <li><h3><font color=#e00000>i386</font></h3>  <li><h3><font color=#e00000>i386</font></h3>
 <ul>  <ul>
   <a name=pms></a>
   <li><font color=#009000><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br>
   Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">A source code patch exists which remedies this problem.</a>
   <p>
 <a name=pcibios></a>  <a name=pcibios></a>
 <li><font color=#009000><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>  <li><font color=#009000><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>
 On some machines, a PCIBIOS device driver interrupt allocation bug can cause a  On some machines, a PCIBIOS device driver interrupt allocation bug can cause a

Legend:
Removed from v.1.298  
changed lines
  Added in v.1.299