=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata30.html,v retrieving revision 1.105 retrieving revision 1.106 diff -u -r1.105 -r1.106 --- www/errata30.html 2019/05/27 22:55:19 1.105 +++ www/errata30.html 2019/05/28 16:32:41 1.106 @@ -84,160 +84,227 @@
/etc/hosts
file to
+be incorrectly formed.
+ #.#.#.# hostname. hostname
-
+ #.#.#.# hostname.domainname.com hostname
+
+To correct this problem, simply edit the file and insert the domainname in +the required place. +
+ +
+
+
+
UseLogin
+sshd option
++
+Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.2. + A source code patch exists which remedies this problem. +This is the second version of this patch.
-
-
-
-
-
-
+ +
boot cd:,OFWBOOT /3.0/macppc/bsd.rd
-
-
-
-
-
-
-
-
-
+
-
-
-
-
-
-
-
-
-
-
boot cd:,OFWBOOT /3.0/macppc/bsd.rd
+This is the second version of the patch.
-
-
-
-
-
-
-
-
-
-
UseLogin
-sshd option
--
-Effectively an upgrade of OpenSSH 3.0 to OpenSSH 3.0.2.
-
+Incorrect argument checking in the
+getrlimit(2)
+system call may allow an attacker to crash the kernel.
+
A source code patch exists which remedies this problem.
-This is the second version of this patch.
-
/etc/hosts
file to
-be incorrectly formed.
- #.#.#.# hostname. hostname
-
-This line should actually read something like:
- #.#.#.# hostname.domainname.com hostname
-
-To correct this problem, simply edit the file and insert the domainname in
-the required place.
+A buffer overflow in
+named(8)
+could allow an attacker to execute code with the privileges of named.
+On OpenBSD, named runs as a non-root user in a chrooted environment
+which mitigates the effects of this bug.
+
+A source code patch exists which remedies this problem.