[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.356 and 1.357

version 1.356, 2001/10/22 22:21:56 version 1.357, 2001/11/13 17:25:48
Line 47 
Line 47 
 <a name=all></a>  <a name=all></a>
 <li><h3><font color=#e00000>All architectures</font></h3>  <li><h3><font color=#e00000>All architectures</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <a name=hosts>
   <li><font color=#009000><strong>001: INSTALL ISSUE: November 12, 2001</strong></font><br>
   A small bug in the installation script causes the <tt>/etc/hosts</tt> file to
   be incorrectly formed.<br>
   The resulting file contains a line which reads like:<p>
   <tt>
   &nbsp;&nbsp;&nbsp;#.#.#.# hostname. hostname
   </tt>
   <p>
   This line should actually read something like:<p>
   <tt>
   &nbsp;&nbsp;&nbsp;#.#.#.# hostname.domainname.com hostname
   </tt>
   <p>
   To correct this problem, simply edit the file and insert the domainname in
   the required place.
   <p>
   <a name=sshd>
   <li><font color=#009000><strong>002: SECURITY FIX: November 12, 2001</strong></font><br>
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&sektion=8">sshd(8)</a>
   is being upgraded from OpenSSH 3.0 to OpenSSH 3.0.1 to fix a few problems:
   <p>
   <ul>
   <li>A security hole that may allow an attacker to partially authenticate
   if -- and only if -- the administrator has enabled KerberosV.
   <br>
   By default, OpenSSH KerberosV support only becomes active after KerberosV
   has been properly configured.
   <p>
   <li>An excessive memory clearing bug (which we believe to be unexploitable)
   also exists, but since this may cause daemon crashes, we are providing a
   patch as well.
   <p>
   <li>Various other non-critical fixes.
 </ul>  </ul>
 <p>  <p>
   Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.1,
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/002_ssh.patch">a source code patch exists which remedies these problems</a>.
   <p>
   </ul>
   <p>
 <a name=i386></a>  <a name=i386></a>
 <li><h3><font color=#e00000>i386</font></h3>  <li><h3><font color=#e00000>i386</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <a name=hifn>
   <li><font color=#009000><strong>004: RELIABILITY FIX: November 12, 2001</strong></font>
   <br>
   Hifn7751 based cards may stop working on certain motherboards due to
   DMA errors.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/i386/004_hifn.patch">A source code patch exists which remedies the problem</a>.
   <p>
 </ul>  </ul>
 <p>  <p>
 <a name=alpha></a>  <a name=alpha></a>
Line 77 
Line 122 
 <a name=sparc64></a>  <a name=sparc64></a>
 <li><h3><font color=#e00000>sparc64</font></h3>  <li><h3><font color=#e00000>sparc64</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <a name=sparc64cd></a>
   <li><font color=#009000><strong>003: RELIABILITY FIX: November 12, 2001</strong></font>
   <br>
   Access to a CD drive on the PCI ultrasparc machines results in a continuous stream
   of bogus interrupt messages, causing great user anguish.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/sparc64/003_sparc64cd.patch">A source code patch exists which remedies the problem</a>.
   <p>
 </ul>  </ul>
 <p>  <p>
 <a name=amiga></a>  <a name=amiga></a>
Line 101 
Line 153 
 <a name=macppc></a>  <a name=macppc></a>
 <li><h3><font color=#e00000>macppc</font></h3>  <li><h3><font color=#e00000>macppc</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <a name=altivec></a>
   <li><font color=#009000><strong>005: RELIABILITY FIX: November 12, 2001</strong></font>
   <br>
   Execution of Altivec instructions will crash the kernel.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/macppc/005_altivec.patch">A source code patch exists which remedies the problem</a>.
   <p>
 </ul>  </ul>
 <p>  <p>
 <a name=vax></a>  <a name=vax></a>

Legend:
Removed from v.1.356  
changed lines
  Added in v.1.357