> ----- Original Message ----- > From: Darren Reed <avalon@coombs.anu.edu.au> > To: <listener@witworx.com> > Cc: <misc@openbsd.org> > Sent: Friday, March 01, 2002 9:20 AM > Subject: Re: Securing Small Networks with OpenBSD > > > > In some mail from Rod... Whitworth, sie said: > > > > > > On Fri, 1 Mar 2002 11:56:11 +0000, A. Farber wrote: > > > > > > >On Fri, Mar 01, 2002 at 10:48:12PM +1100, Rod... Whitworth wrote: > > > >> On Fri, 1 Mar 2002 11:37:25 +0000, A. Farber wrote: > > > >> > > > >> >http://www.onlamp.com/lpt/a//bsd/2002/02/28/openbsd.html > > > >> > > > > >> It would be nice if it was not 2 revs out of date, eh? In other words > > > >> over 12 months since 2.8 was released. > > > > > > > >There aren't so many articles about OpenBSD, eh? > > > > > > > IPF is obsolete. > > > > Really? > > > > Really.
522 :名無しさん@お腹いっぱい。 :02/03/03 17:40
ここの人たちの中にOpenBSDでVMware for Linuxを動かしているツワモノは・・・ いないですよねぇ
015: RELIABILITY FIX: March 13, 2002 Under some circumstances the zlib compression library can free dynamically allocated memory twice. This is not a security issue on OpenBSD since the BSD free(3) function detects this. There is also a kernel zlib component that may be used by pppd and IPSec. The feasibility of attacking the kernel this way is currently unknown.
ゆえに、age
549 :名無しさん@お腹いっぱい。 :02/03/21 12:39
016: SECURITY FIX: March 19, 2002 Under certain conditions, on systems using YP with netgroups in the password database, it is possible for the rexecd(8) and rshd(8) for the rexecd and rshd daemons to execute the shell from a different user's password entry. Due to a similar problem, atrun(8) may change to the wrong home directory when running at(1) jobs.
あげ!!
550 :名無しさん@お腹いっぱい。 :02/03/22 16:50
ports/*/*/files/md5 から ports/*/*/distinfo に変わった age
551 :名無しさん@お腹いっぱい。 :02/03/28 02:29
017: RELIABILITY FIX: March 26, 2002 isakmpd(8) will crash when receiving a zero length IKE packet due to a too-late length check
018: SECURITY FIX: April 11, 2002 mail(1) will process tilde escapes even in non-interactive mode. This can lead to a local root compromise. A source code patch exists which remedies the problem.
019: SECURITY FIX: April 22, 2002 A local user can gain super-user privileges due to a buffer overflow in sshd(8) if AFS has been configured on the system or if KerberosTgtPassing or AFSTokenPassing has been enabled in the sshd_config file. Ticket and token passing is not enabled by default.
ほい。
605 :601 :02/04/25 12:51
boot device: linux file and args: SILO Cannot find /etc/solo.conf(Can't read an inode table
Couldn't load /etc/silo.conf No config file loaded, you can boot just from this command line Type [prompth;]part/path_to_image [parameters] on the prompt E.g. /iommu/sbus/espdma/esp/sd@3,0;4/vmlinux root=/dev/sda4 or 2/vmlinux.live (to load vmlinux.live from 2nd partition of boot disk