===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata25.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -c -r1.59 -r1.60
*** www/errata25.html 2014/10/02 14:34:45 1.59
--- www/errata25.html 2015/02/14 04:36:51 1.60
***************
*** 81,87 ****
! -
SECURITY FIX: Aug 30, 1999
All architectures
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
--- 81,87 ----
! -
SECURITY FIX: Aug 30, 1999
All architectures
In cron(8), make sure argv[] is NULL terminated in the fake popen() and
***************
*** 89,95 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 12, 1999
All architectures
The procfs and fdescfs filesystems had an overrun in their handling
--- 89,95 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 12, 1999
All architectures
The procfs and fdescfs filesystems had an overrun in their handling
***************
*** 98,111 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 9, 1999
All architectures
Stop profiling (see profil(2)) when we execve() a new process.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 6, 1999
All architectures
Packets that should have been handled by IPsec may be transmitted
--- 98,111 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 9, 1999
All architectures
Stop profiling (see profil(2)) when we execve() a new process.
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 6, 1999
All architectures
Packets that should have been handled by IPsec may be transmitted
***************
*** 113,119 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 5, 1999
All architectures
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
--- 113,119 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Aug 5, 1999
All architectures
In /etc/rc, use mktemp(1) for motd re-writing, and change the find(1)
***************
*** 121,127 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Jul 30, 1999
All architectures
Do not permit regular users to chflags(2) or fchflags(2) on character or
--- 121,127 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Jul 30, 1999
All architectures
Do not permit regular users to chflags(2) or fchflags(2) on character or
***************
*** 129,135 ****
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Jul 27, 1999
All architectures
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
--- 129,135 ----
A source code patch exists which remedies this problem.
!
-
SECURITY FIX: Jul 27, 1999
All architectures
Cause groff(1) to be invoked with the -S flag, when called by nroff(1),
***************
*** 139,145 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX: May 19, 1999
All architectures
Programs using fts(3) could dump core when given a directory structure
--- 139,145 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX: May 19, 1999
All architectures
Programs using fts(3) could dump core when given a directory structure
***************
*** 147,153 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX: May 19, 1999
All architectures
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
--- 147,153 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX: May 19, 1999
All architectures
Sequence numbers could wrap with TCP_SACK and TCP_NEWRENO, resulting in
***************
*** 155,161 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
Retransmitted TCP packets could get corrupted when flowing over an
--- 155,161 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
Retransmitted TCP packets could get corrupted when flowing over an
***************
*** 163,169 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
A local user can crash the system by reading a file larger than 64meg
--- 163,169 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
A local user can crash the system by reading a file larger than 64meg
***************
*** 171,177 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
PF_KEY socket operations leak internal kernel resources, so that a
--- 171,177 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
All architectures
PF_KEY socket operations leak internal kernel resources, so that a
***************
*** 181,187 ****
A source code patch exists which remedies this problem.
!
-
Y2K FIX: Aug 30, 1999
This patch corrects various OpenBSD/i386 2.5 problems with Y2K. The 2.6
release (released at 1 Dec 1999) has this problem solved. This patch is
--- 181,187 ----
A source code patch exists which remedies this problem.
!
-
Y2K FIX: Aug 30, 1999
This patch corrects various OpenBSD/i386 2.5 problems with Y2K. The 2.6
release (released at 1 Dec 1999) has this problem solved. This patch is
***************
*** 189,202 ****
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
If a user opened the brooktree device on a system where it did not exist,
the kernel crashed.
A source code patch exists which remedies this problem.
!
-
INSTALL PROBLEM
The mac68k install utils were mistakenly left off the CD and out of
the FTP install directories. These tools have now been added to the
--- 189,202 ----
A source code patch exists which remedies this problem.
!
-
RELIABILITY FIX
If a user opened the brooktree device on a system where it did not exist,
the kernel crashed.
A source code patch exists which remedies this problem.
!
-
INSTALL PROBLEM
The mac68k install utils were mistakenly left off the CD and out of
the FTP install directories. These tools have now been added to the
***************
*** 204,210 ****
http://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils
!
-
RELIABILITY FIX
Two problems in the powerpc kernel trap handling cause severe system
unreliability.
--- 204,210 ----
http://ftp.openbsd.org/pub/OpenBSD/2.5/mac68k/utils
!
-
RELIABILITY FIX
Two problems in the powerpc kernel trap handling cause severe system
unreliability.