===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata24.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -c -r1.64 -r1.65
*** www/errata24.html 2014/10/02 14:34:45 1.64
--- www/errata24.html 2015/02/14 04:36:51 1.65
***************
*** 81,87 ****
! -
RELIABILITY FIX
All architectures
A local user can crash the system by reading a file larger than 64meg
--- 81,87 ----
! -
RELIABILITY FIX
All architectures
A local user can crash the system by reading a file larger than 64meg
***************
*** 89,109 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
A local user can crash the system because of a bug in the vfs layer.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A machine crash is possible when playing with poll(2).
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A machine crash is possible when playing with link(2) on FFS.
--- 89,109 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
A local user can crash the system because of a bug in the vfs layer.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A machine crash is possible when playing with poll(2).
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A machine crash is possible when playing with link(2) on FFS.
***************
*** 111,124 ****
A source code patch exists which remedies this problem.
This is version four of the patch.
!
-
SECURITY FIX
All architectures
A buffer overflow existed in ping(8), which may have a security issue.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A race condition in IP ipq handling could permit a remote crash.
--- 111,124 ----
A source code patch exists which remedies this problem.
This is version four of the patch.
!
-
SECURITY FIX
All architectures
A buffer overflow existed in ping(8), which may have a security issue.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A race condition in IP ipq handling could permit a remote crash.
***************
*** 127,133 ****
It must be installed after the maxqueue patch.
and the tcp decoding patch.
!
-
SECURITY FIX
All architectures
A race condition existed between accept(2) and select(2) which could
--- 127,133 ----
It must be installed after the maxqueue patch.
and the tcp decoding patch.
!
-
SECURITY FIX
All architectures
A race condition existed between accept(2) and select(2) which could
***************
*** 135,148 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
IP fragment assembly can bog the machine excessively and cause problems.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
The readv(2) and writev(2) system calls would not accept a struct iovec
--- 135,148 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
IP fragment assembly can bog the machine excessively and cause problems.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
The readv(2) and writev(2) system calls would not accept a struct iovec
***************
*** 150,163 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
TCP/IP RST handling was too sloppy.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
--- 150,163 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
TCP/IP RST handling was too sloppy.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
During bootup, kvm_mkdb may exit with the error "kvm_mkdb: cannot allocate
***************
*** 165,171 ****
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
A problem with writing to NFS version 3 mounted filesystems from Solaris 7
--- 165,171 ----
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
A problem with writing to NFS version 3 mounted filesystems from Solaris 7
***************
*** 174,180 ****
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
A problem with NFS version 3 mounts on big endian machines (m68k, sparc
--- 174,180 ----
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
All architectures
A problem with NFS version 3 mounts on big endian machines (m68k, sparc
***************
*** 184,190 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A security problem exists in the curses and ocurses libraries that affect
--- 184,190 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A security problem exists in the curses and ocurses libraries that affect
***************
*** 196,202 ****
i386
platform. Unpack it in /usr/lib.
!
-
FUNCTIONALITY FIX
All architectures
A workaround for an xterm problem that causes vi to not
--- 196,202 ----
i386
platform. Unpack it in /usr/lib.
!
-
FUNCTIONALITY FIX
All architectures
A workaround for an xterm problem that causes vi to not
***************
*** 212,225 ****
big endian version.
!
-
FUNCTIONALITY FIX
All architectures
userdir support was accidentally left out of httpd(8).
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
--- 212,225 ----
big endian version.
!
-
FUNCTIONALITY FIX
All architectures
userdir support was accidentally left out of httpd(8).
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
All architectures
A remotely exploitable problem exists in bootpd(8). bootpd is disabled
***************
*** 228,248 ****
A source code patch exists which remedies this problem.
This is the second version of the patch.
!
-
SECURITY FIX
All architectures
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
This is another fix for a kernel crash caused by the
crashme program.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
The kernel was using a fixed and hard-coded location for the arguments
vector passed from the /boot loader. This prevented
--- 228,248 ----
A source code patch exists which remedies this problem.
This is the second version of the patch.
!
-
SECURITY FIX
All architectures
A remote machine lockup problem exists in the TCP decoding code.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
This is another fix for a kernel crash caused by the
crashme program.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
The kernel was using a fixed and hard-coded location for the arguments
vector passed from the /boot loader. This prevented
***************
*** 254,267 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
i386 trace-trap handling when DDB was configured could cause a system
crash.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
i386 installboot had a sign extension bug which prevented proper bootblock
initialization when the root filesystem was placed beyond 4GB.
--- 254,267 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX
i386 trace-trap handling when DDB was configured could cause a system
crash.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
i386 installboot had a sign extension bug which prevented proper bootblock
initialization when the root filesystem was placed beyond 4GB.
***************
*** 270,276 ****
Unfortunately, updated 2.4 install floppies are not available. Just ensure
that your root filesystem is below 4GB, for now.
!
-
DRIVER FIX
The sparc hme(4) and be(4) drivers work poorly on some types of SS-20
machines. This is because those machines lie, saying they support 64-bit DMA
--- 270,276 ----
Unfortunately, updated 2.4 install floppies are not available. Just ensure
that your root filesystem is below 4GB, for now.
!
-
DRIVER FIX
The sparc hme(4) and be(4) drivers work poorly on some types of SS-20
machines. This is because those machines lie, saying they support 64-bit DMA
***************
*** 278,291 ****
A source code patch exists which remedies this problem.
!
-
DRIVER FIX
The sparc le(4) driver does media changes incorrectly on one type of
sbus le(4) card.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
The Xhp as shipped does not have the execute permissions set. The fix is
'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X.
--- 278,291 ----
A source code patch exists which remedies this problem.
!
-
DRIVER FIX
The sparc le(4) driver does media changes incorrectly on one type of
sbus le(4) card.
A source code patch exists which remedies this problem.
!
-
FUNCTIONALITY FIX
The Xhp as shipped does not have the execute permissions set. The fix is
'chmod 755 /usr/X11R6/bin/Xhp' if you have installed X.