version 1.23, 2002/10/17 21:38:38 |
version 1.24, 2003/03/06 21:44:07 |
|
|
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML Strict//EN"> |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> |
<html> |
<html> |
<head> |
<head> |
<title>OpenBSD 2.6 errata</title> |
<title>OpenBSD 2.6 errata</title> |
<link rev=made href=mailto:www@openbsd.org> |
<link rev=made href="mailto:www@openbsd.org"> |
<meta name="resource-type" content="document"> |
<meta name="resource-type" content="document"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="keywords" content="openbsd,cd,errata"> |
<meta name="keywords" content="openbsd,cd,errata"> |
|
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
|
|
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a> |
<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a> |
<h2><font color=#0000e0> |
<h2><font color="#0000e0"> |
This is the OpenBSD 2.6 release errata & patch list: |
This is the OpenBSD 2.6 release errata & patch list: |
|
|
</font></h2> |
</font></h2> |
|
|
<br> |
<br> |
<hr> |
<hr> |
|
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6.tar.gz> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6.tar.gz"> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
|
|
|
|
<ul> |
<ul> |
<dl> |
<dl> |
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
<a name=semconfig></a> |
<a name=semconfig></a> |
<li><font color=#009000><strong>024: SECURITY FIX: May 26, 2000</strong></font><br> |
<li><font color="#009000"><strong>024: SECURITY FIX: May 26, 2000</strong></font><br> |
Kernel contained an undocumented system call used to lock semaphore operations |
Kernel contained an undocumented system call used to lock semaphore operations |
while they were being sampled by the ipcs(1) command. This locking could be |
while they were being sampled by the ipcs(1) command. This locking could be |
used as a local denial of service attack which would block the exiting of |
used as a local denial of service attack which would block the exiting of |
processes which had semaphore resources allocated. Processes not using |
processes which had semaphore resources allocated. Processes not using |
semaphores are not affected, so the actual effect is very minimal.<br> |
semaphores are not affected, so the actual effect is very minimal.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/024_sysv_sem.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/024_sysv_sem.patch"> |
A jumbo patch exists which remedies this problem.</a> |
A jumbo patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=ipf></a> |
<a name=ipf></a> |
<li><font color=#009000><strong>023: SECURITY FIX: May 25, 2000</strong></font><br> |
<li><font color="#009000"><strong>023: SECURITY FIX: May 25, 2000</strong></font><br> |
A misuse of ipf(8) |
A misuse of ipf(8) |
<i>keep-state</i> rules can result in firewall rules being |
<i>keep-state</i> rules can result in firewall rules being |
bypassed. |
bypassed. |
This patch also includes fixes for an unaligned timestamp issue, |
This patch also includes fixes for an unaligned timestamp issue, |
and reliability fixes for ipmon and the in-kernel ftp proxy.<br> |
and reliability fixes for ipmon and the in-kernel ftp proxy.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/023_ipf.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/023_ipf.patch"> |
A jumbo patch exists</a>, which remedies this problem, and updates ipf |
A jumbo patch exists</a>, which remedies this problem, and updates ipf |
to version 3.3.16. |
to version 3.3.16. |
<p> |
<p> |
<a name=xlockmore></a> |
<a name=xlockmore></a> |
<li><font color=#009000><strong>022: SECURITY FIX: May 25, 2000</strong></font><br> |
<li><font color="#009000"><strong>022: SECURITY FIX: May 25, 2000</strong></font><br> |
xlockmore has a localhost attack against it which allows recovery of the encrypted |
xlockmore has a localhost attack against it which allows recovery of the encrypted |
hash of the root password. The damage to systems using DES passwords from this |
hash of the root password. The damage to systems using DES passwords from this |
attack is pretty heavy, but to systems with a well-chosen root password under |
attack is pretty heavy, but to systems with a well-chosen root password under |
blowfish encoding |
blowfish encoding |
(see <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&sektion=3"> |
(see <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypt&sektion=3"> |
crypt(3)</a>) |
crypt(3)</a>) |
the impact is much reduced.<br> |
the impact is much reduced.<br> |
(Aside: We do not consider this a localhost root hole in the default install, |
(Aside: We do not consider this a localhost root hole in the default install, |
since we have not seen a fast blowfish cracker yet ;-)<br> |
since we have not seen a fast blowfish cracker yet ;-)<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/022_xlockmore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/022_xlockmore.patch"> |
A source code patch exists, which remedies this problem. This is the 2nd patch designed to solve this problem.</a> |
A source code patch exists, which remedies this problem. This is the 2nd patch designed to solve this problem.</a> |
<p> |
<p> |
<a name=rzsz></a> |
<a name=rzsz></a> |
<li><font color=#009000><strong>021: RZSZ SNOOPING: Jan 31, 2000</strong></font><br> |
<li><font color="#009000"><strong>021: RZSZ SNOOPING: Jan 31, 2000</strong></font><br> |
The rzsz port was removed from the ports collection, as it collects and |
The rzsz port was removed from the ports collection, as it collects and |
sends user information to a designated email address, effectively spying on |
sends user information to a designated email address, effectively spying on |
you. <em>It is recommended that you remove this package if you installed |
you. <em>It is recommended that you remove this package if you installed |
it</em>. |
it</em>. |
<p> |
<p> |
<a name=syslog></a> |
<a name=syslog></a> |
<li><font color=#009000><strong>020: LIBRARY IMPROVEMENT: Jan 26, 2000</strong></font><br> |
<li><font color="#009000"><strong>020: LIBRARY IMPROVEMENT: Jan 26, 2000</strong></font><br> |
syslog(3) would not try to reopen the socket, thus, nightly newsyslog(8) |
syslog(3) would not try to reopen the socket, thus, nightly newsyslog(8) |
would cause syslogd(8) to not see new messages. |
would cause syslogd(8) to not see new messages. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/020_syslog.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/020_syslog.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=nsphy></a> |
<a name=nsphy></a> |
<li><font color=#009000><strong>019: DRIVER IMPROVEMENT: Jan 20, 2000</strong></font><br> |
<li><font color="#009000"><strong>019: DRIVER IMPROVEMENT: Jan 20, 2000</strong></font><br> |
Intel fxp cards with National Semiconductor PHYs (nsphy) have trouble |
Intel fxp cards with National Semiconductor PHYs (nsphy) have trouble |
negotiating and maintaining 100Mb link integrity.<br> |
negotiating and maintaining 100Mb link integrity.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/019_nsphy.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/019_nsphy.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=procfs></a> |
<a name=procfs></a> |
<li><font color=#009000><strong>018: SECURITY FIX: Jan 20, 2000</strong></font><br> |
<li><font color="#009000"><strong>018: SECURITY FIX: Jan 20, 2000</strong></font><br> |
Systems running with procfs enabled and mounted are vulnerable |
Systems running with procfs enabled and mounted are vulnerable |
to having the stderr output of setuid processes directed onto |
to having the stderr output of setuid processes directed onto |
a pre-seeked descriptor onto the stack in their own procfs memory.<br> |
a pre-seeked descriptor onto the stack in their own procfs memory.<br> |
Note that procfs is not mounted by default in OpenBSD.<br> |
Note that procfs is not mounted by default in OpenBSD.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/018_procfs.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/018_procfs.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=aty2k></a> |
<a name=aty2k></a> |
<li><font color=#009000><strong>015: Y2K FIX: Jan 9, 2000</strong></font><br> |
<li><font color="#009000"><strong>015: Y2K FIX: Jan 9, 2000</strong></font><br> |
The at(1) command was unable to parse some kinds of dates.<br> |
The at(1) command was unable to parse some kinds of dates.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/015_aty2k.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/015_aty2k.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=addusery2k></a> |
<a name=addusery2k></a> |
<li><font color=#009000><strong>013: Y2K FIX: Jan 3, 2000</strong></font><br> |
<li><font color="#009000"><strong>013: Y2K FIX: Jan 3, 2000</strong></font><br> |
A minor problem in the logging support for the adduser(8) command.<br> |
A minor problem in the logging support for the adduser(8) command.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/013_addusery2k.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/013_addusery2k.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=3c900b></a> |
<a name=3c900b></a> |
<li><font color=#009000><strong>012: DRIVER IMPROVEMENT: Jan 3, 2000</strong></font><br> |
<li><font color="#009000"><strong>012: DRIVER IMPROVEMENT: Jan 3, 2000</strong></font><br> |
The 3C900B-TPO fails to select the correct media type (it never sees or |
The 3C900B-TPO fails to select the correct media type (it never sees or |
sends packets).<br> |
sends packets).<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_3c900b.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/012_3c900b.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=poll></a> |
<a name=poll></a> |
<li><font color=#009000><strong>011: SECURITY FIX: Dec 4, 1999</strong></font><br> |
<li><font color="#009000"><strong>011: SECURITY FIX: Dec 4, 1999</strong></font><br> |
Various bugs in poll(2) may cause a kernel crash.<br> |
Various bugs in poll(2) may cause a kernel crash.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/011_poll.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/011_poll.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=sendmail></a> |
<a name=sendmail></a> |
<li><font color=#009000><strong>010: SECURITY FIX: Dec 4, 1999</strong></font><br> |
<li><font color="#009000"><strong>010: SECURITY FIX: Dec 4, 1999</strong></font><br> |
Sendmail had a race in aliases file handling, which this patch fixes.<br> |
Sendmail had a race in aliases file handling, which this patch fixes.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/010_sendmail.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/010_sendmail.patch"> |
A source code patch exists, which remedies this problem.</a> |
A source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=atapijumbo></a> |
<a name=atapijumbo></a> |
<li><font color=#009000><strong>009: DRIVER IMPROVEMENTS: Dec 4, 1999</strong></font><br> |
<li><font color="#009000"><strong>009: DRIVER IMPROVEMENTS: Dec 4, 1999</strong></font><br> |
Various improvements have been made to the IDE/ATAPI subsystem since |
Various improvements have been made to the IDE/ATAPI subsystem since |
the 2.6 release shipped.<br> |
the 2.6 release shipped.<br> |
Some of these improvements make some recalcitrant devices work much better. |
Some of these improvements make some recalcitrant devices work much better. |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/009_atapi.patch><br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/009_atapi.patch"><br> |
Revision 1 of this jumbo source code patch exists.</a><br> |
Revision 1 of this jumbo source code patch exists.</a><br> |
<p> |
<p> |
<a name=sslUSA></a> |
<a name=sslUSA></a> |
<li><font color=#009000><strong>016: SECURITY FIX: Dec 2, 1999</strong></font><br> |
<li><font color="#009000"><strong>016: SECURITY FIX: Dec 2, 1999</strong></font><br> |
A buffer overflow in the RSAREF code included in the |
A buffer overflow in the RSAREF code included in the |
USA version of the libssl package (called <strong>sslUSA</strong>, is |
USA version of the libssl package (called <strong>sslUSA</strong>, is |
possibly exploitable in isakmpd if SSL/RSA features |
possibly exploitable in isakmpd if SSL/RSA features |
are enabled or used.<br> |
are enabled or used.<br> |
<a href=http://www.openssh.com>OpenSSH</a> and httpd (with -DSSL) are not |
<a href="http://www.openssh.com">OpenSSH</a> and httpd (with -DSSL) are not |
vulnerable.<br> |
vulnerable.<br> |
<strong>NOTE: International users using the ssl26 package are not affected.</strong> |
<strong>NOTE: International users using the ssl26 package are not affected.</strong> |
<p> |
<p> |
|
|
<strong>NOTE: this problem turned out to not be unexploitable in OpenSSH.</strong> |
<strong>NOTE: this problem turned out to not be unexploitable in OpenSSH.</strong> |
<p> |
<p> |
<a name=fortran></a> |
<a name=fortran></a> |
<li><font color=#009000><strong>017: FUNCTIONALITY ADDITION: Nov 14, 1999</strong></font><br> |
<li><font color="#009000"><strong>017: FUNCTIONALITY ADDITION: Nov 14, 1999</strong></font><br> |
Fortran doesn't work right. The file /usr/include/g2c.h is missing in the |
Fortran doesn't work right. The file /usr/include/g2c.h is missing in the |
release.<br> |
release.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/008_fortran.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/008_fortran.patch"> |
A source code patch exists which remedies this problem.</a><br> |
A source code patch exists which remedies this problem.</a><br> |
The patch fixes the source tree and describes how to properly add |
The patch fixes the source tree and describes how to properly add |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/g2c.h> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/g2c.h"> |
the include file</a> to your system. |
the include file</a> to your system. |
<p> |
<p> |
<a name=sshjumbo></a> |
<a name=sshjumbo></a> |
<li><font color=#009000><strong>005: FUNCTIONALITY ADDITION: Nov 11, 1999</strong></font><br> |
<li><font color="#009000"><strong>005: FUNCTIONALITY ADDITION: Nov 11, 1999</strong></font><br> |
Various OpenSSH improvements have been made since the 2.6 release shipped.<br> |
Various OpenSSH improvements have been made since the 2.6 release shipped.<br> |
To resolve the various (non-security related) features which users may want, |
To resolve the various (non-security related) features which users may want, |
we are making a jumbo patch available. <strong>This is now at VERSION FOUR.</strong><br> |
we are making a jumbo patch available. <strong>This is now at VERSION FOUR.</strong><br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/005_sshjumbo.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/005_sshjumbo.patch"> |
Revision 4 of this jumbo source code patch exists.</a><br> |
Revision 4 of this jumbo source code patch exists.</a><br> |
<strong>NOTE: /etc/sshd_config and /etc/ssh_config may need changes.</strong> |
<strong>NOTE: /etc/sshd_config and /etc/ssh_config may need changes.</strong> |
<p> |
<p> |
<a name=m4></a> |
<a name=m4></a> |
<li><font color=#009000><strong>003: FUNCTIONALITY FIX: Nov 10, 1999</strong></font><br> |
<li><font color="#009000"><strong>003: FUNCTIONALITY FIX: Nov 10, 1999</strong></font><br> |
m4 is quite broken in the 2.6 release.<br> |
m4 is quite broken in the 2.6 release.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/003_m4.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/003_m4.patch"> |
The 3rd version of the source code patch exists, which remedies this problem.</a> |
The 3rd version of the source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=ifmedia></a> |
<a name=ifmedia></a> |
<li><font color=#009000><strong>002: SECURITY FIX: Nov 9, 1999</strong></font><br> |
<li><font color="#009000"><strong>002: SECURITY FIX: Nov 9, 1999</strong></font><br> |
Any user can change interface media configurations.<br> |
Any user can change interface media configurations.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/002_ifmedia.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/002_ifmedia.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
<a name=newsyslog></a> |
<a name=newsyslog></a> |
<li><font color=#009000><strong>001: RELIABILITY FIX: Nov 8, 1999</strong></font><br> |
<li><font color="#009000"><strong>001: RELIABILITY FIX: Nov 8, 1999</strong></font><br> |
A race condition in newsyslog(8) can cause errors in log file rotation.<br> |
A race condition in newsyslog(8) can cause errors in log file rotation.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/001_newsyslog.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/common/001_newsyslog.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color="#e00000">i386</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=mac68k></a> |
<a name=mac68k></a> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<li><h3><font color="#e00000">mac68k</font></h3> |
<ul> |
<ul> |
<a name=m68k_locore></a> |
<a name=m68k_locore></a> |
<a name=mac68k_locore></a> |
<a name=mac68k_locore></a> |
<li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
<li><font color="#009000"><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
All m68k kernels can possibly be crashed by a user.<br> |
All m68k kernels can possibly be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=sparc></a> |
<a name=sparc></a> |
<li><h3><font color=#e00000>sparc</font></h3> |
<li><h3><font color="#e00000">sparc</font></h3> |
<ul> |
<ul> |
<a name=eepromy2k></a> |
<a name=eepromy2k></a> |
<li><font color=#009000><strong>014: Y2K FIX: Jan 3, 2000</strong></font><br> |
<li><font color="#009000"><strong>014: Y2K FIX: Jan 3, 2000</strong></font><br> |
A minor problem; the sparc eeprom(8) command is not Y2K compliant.<br> |
A minor problem; the sparc eeprom(8) command is not Y2K compliant.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/014_eepromy2k.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/014_eepromy2k.patch"> |
Revision 2 of the source code patch exists, which remedies this problem.</a> |
Revision 2 of the source code patch exists, which remedies this problem.</a> |
<p> |
<p> |
<a name=sparc_locore></a> |
<a name=sparc_locore></a> |
<li><font color=#009000><strong>004: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
<li><font color="#009000"><strong>004: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
The sparc kernel can be crashed by a user.<br> |
The sparc kernel can be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/004_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/sparc/004_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=amiga></a> |
<a name=amiga></a> |
<li><h3><font color=#e00000>amiga</font></h3> |
<li><h3><font color="#e00000">amiga</font></h3> |
<ul> |
<ul> |
<a name=amiga_locore></a> |
<a name=amiga_locore></a> |
<li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
<li><font color="#009000"><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
All m68k kernels can possibly be crashed by a user.<br> |
All m68k kernels can possibly be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=pmax></a> |
<a name=pmax></a> |
<li><h3><font color=#e00000>pmax</font></h3> |
<li><h3><font color="#e00000">pmax</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=arc></a> |
<a name=arc></a> |
<li><h3><font color=#e00000>arc</font></h3> |
<li><h3><font color="#e00000">arc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=alpha></a> |
<a name=alpha></a> |
<li><h3><font color=#e00000>alpha</font></h3> |
<li><h3><font color="#e00000">alpha</font></h3> |
<ul> |
<ul> |
<a name=alpha_locore></a> |
<a name=alpha_locore></a> |
<li><font color=#009000><strong>006: RELIABILITY FIX: Nov 13, 1999</strong></font><br> |
<li><font color="#009000"><strong>006: RELIABILITY FIX: Nov 13, 1999</strong></font><br> |
The alpha kernel can possibly be crashed by a user.<br> |
The alpha kernel can possibly be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/alpha/006_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/alpha/006_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=hp300></a> |
<a name=hp300></a> |
<li><h3><font color=#e00000>hp300</font></h3> |
<li><h3><font color="#e00000">hp300</font></h3> |
<ul> |
<ul> |
<a name=hp300_locore></a> |
<a name=hp300_locore></a> |
<li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
<li><font color="#009000"><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
All m68k kernels can possibly be crashed by a user.<br> |
All m68k kernels can possibly be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=mvme68k></a> |
<a name=mvme68k></a> |
<li><h3><font color=#e00000>mvme68k</font></h3> |
<li><h3><font color="#e00000">mvme68k</font></h3> |
<ul> |
<ul> |
<a name=mvme68k_locore></a> |
<a name=mvme68k_locore></a> |
<li><font color=#009000><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
<li><font color="#009000"><strong>007: RELIABILITY FIX: Nov 12, 1999</strong></font><br> |
All m68k kernels can possibly be crashed by a user.<br> |
All m68k kernels can possibly be crashed by a user.<br> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.6/m68k/007_locore.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
<a name=powerpc></a> |
<a name=powerpc></a> |
<li><h3><font color=#e00000>powerpc</font></h3> |
<li><h3><font color="#e00000">powerpc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
|
|
|
|
<hr> |
<hr> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=mailto:www@openbsd.org>www@openbsd.org</a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<br><small>$OpenBSD$</small> |
<br><small>$OpenBSD$</small> |
|
|
</body> |
</body> |