version 1.280, 2000/10/26 14:12:08 |
version 1.281, 2000/11/02 16:40:39 |
|
|
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML Strict//EN"> |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML Strict//EN"> |
<html> |
<html> |
<head> |
<head> |
<title>OpenBSD 2.7 errata</title> |
<title>OpenBSD 2.8 errata</title> |
<link rev=made href=mailto:www@openbsd.org> |
<link rev=made href=mailto:www@openbsd.org> |
<meta name="resource-type" content="document"> |
<meta name="resource-type" content="document"> |
<meta name="description" content="the OpenBSD CD errata page"> |
<meta name="description" content="the OpenBSD CD errata page"> |
|
|
|
|
<img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif"> |
<img alt="[OpenBSD]" height=30 width=141 SRC="images/smalltitle.gif"> |
<h2><font color=#0000e0> |
<h2><font color=#0000e0> |
This is the OpenBSD 2.7 release errata & patch list: |
This is the OpenBSD 2.8 release errata & patch list: |
|
|
</font></h2> |
</font></h2> |
|
|
|
|
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br> |
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br> |
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br> |
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br> |
|
<a href=errata27.html>For 2.7 errata, please refer here</a>.<br> |
<hr> |
<hr> |
|
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz> |
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8.tar.gz> |
You can also fetch a tar.gz file containing all the following patches</a>. |
You can also fetch a tar.gz file containing all the following patches</a>. |
This file is updated once a day. |
This file is updated once a day. |
|
|
<p> The patches below are available in CVS via the |
<p> The patches below are available in CVS via the |
<code>OPENBSD_2_7</code> <a href="stable.html">patch branch</a>. |
<code>OPENBSD_2_8</code> <a href="stable.html">patch branch</a>. |
|
|
<p> |
<p> |
For more detailed information on install patches to OpenBSD, please |
For more detailed information on install patches to OpenBSD, please |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
<a name=xtrans> </a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br> |
|
There are two possibly exploitable potential buffer overflows in the X11 |
|
libraries using the xtrans code. One of these vulnerabilities was |
|
reported to the |
|
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a> |
|
mailing list. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=httpd></a> |
|
<li><font color=#009000><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br> |
|
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> |
|
that could cause arbirtary files accessible to the www user on the server |
|
to be exposed under certain configurations when these modules are used. |
|
(These modules are not active by default). |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=telnetd></a> |
|
<li><font color=#009000><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br> |
|
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH |
|
and TERMCAP (when it starts with a '/') environment variables. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=sendmail></a> |
|
<li><font color=#009000><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br> |
|
There is a non-exploitable buffer overflow in sendmail's test mode. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=format_strings></a> |
|
<li><font color=#009000><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br> |
|
There are printf-style format string bugs in several privileged programs. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=curses></a> |
|
<li><font color=#009000><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br> |
|
libcurses honored terminal descriptions in the $HOME/.terminfo directory |
|
as well as in the TERMCAP environment variable for setuid and setgid |
|
applications. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=talkd></a> |
|
<li><font color=#009000><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br> |
|
A format string vulnerability exists in talkd(8). It is not clear |
|
yet what the impact is. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=pw_error></a> |
|
<li><font color=#009000><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br> |
|
A format string vulnerability exists in the pw_error(3) function. This |
|
manifests itself as a security hole in the chpass utility. As a workaround |
|
which disables its functionality, do |
|
<pre> |
|
# chmod u-s /usr/bin/chpass |
|
</pre> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=ipsec></a> |
|
<li><font color=#009000><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br> |
|
Bad ESP/AH packets could cause a crash under certain conditions. |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch><br> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=xlock></a> |
|
<li><font color=#009000><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br> |
|
A format string vulnerability exists in xlock. As a workaround which disables |
|
its functionality, do |
|
<pre> |
|
# chmod u-s /usr/X11R6/bin/xlock |
|
</pre> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=X11_libs></a> |
|
<li><font color=#009000><strong>021: SECURITY FIX: July 14, 2000</strong></font><br> |
|
Various problems in X11 libraries have various side effects. We provide a |
|
jumbo patch to fix them.<p> |
|
<ul> |
|
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-15&msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk"> |
|
Nasty X Server Dos</a><br> |
|
This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>. |
|
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk"> |
|
Various nasty libX11 holes</a><br> |
|
This is covered by the patches to <b>xc/lib/X11</b>. |
|
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk"> |
|
libICE DoS</a><br> |
|
This is covered by the patches to <b>xc/lib/ICE</b>. |
|
<li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=Pine.LNX.4.10.10004161835150.863-100000@localhost"> |
|
Server overflow</a><br> |
|
This is covered by the patches to <b>xc/programs/Xserver/xkb</b>. |
|
<br> |
|
Note that the default OpenBSD install is not vulnerable to this, since the |
|
the XFree86 Xwrapper already has tests for bad arguments. |
|
</ul> |
</ul> |
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch> |
|
A source code patch exists which remedies these problems.</a><br> |
|
<strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br> |
|
<strong>Note 2:</strong> When re-building use the command |
|
`make DESTDIR=/ build' or you will get an error in the last |
|
step of the build (makewhatis). If you forget to set DESTDIR you can |
|
ignore the build error. The whatis database will be rebuilt the next |
|
time /etc/weekly runs. |
|
<p> |
<p> |
<a name=ftpd></a> |
|
<li><font color=#009000><strong>019: SECURITY FIX: July 5, 2000</strong></font><br> |
|
Just like pretty much all the other unix ftp daemons on the planet, |
|
ftpd had a remote root hole in it. Luckily, ftpd was not enabled by default. |
|
The problem exists if anonymous ftp is enabled. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=mopd></a> |
|
<li><font color=#009000><strong>018: SECURITY FIX: July 5, 2000</strong></font><br> |
|
Mopd contained a buffer overflow. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=screen></a> |
|
<li><font color=#009000><strong>017: INSTALLATION FIX: July 3, 2000</strong></font> |
|
<br> |
|
The screen package shipped with 2.7 does not install itself properly. The |
|
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to |
|
screen-3.9.5.tgz.old and a replacement package has been provided under the |
|
name screen-3.9.5p1.tgz. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=libedit></a> |
|
<li><font color=#009000><strong>013: SECURITY FIX: June 28, 2000</strong></font><br> |
|
libedit would check for a <b>.editrc</b> file in the current directory. |
|
That behaviour is not nice; this does not turn into a security problem in |
|
any real world situation that we know of, but a patch is available anyways. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=dhclient></a> |
|
<li><font color=#009000><strong>012: SECURITY FIX: June 24, 2000</strong></font><br> |
|
A serious bug in dhclient(8) could allow strings from a malicious dhcp |
|
server to be executed in the shell as root. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=isakmpd></a> |
|
<li><font color=#009000><strong>009: SECURITY FIX: June 9, 2000</strong></font><br> |
|
A serious bug in isakmpd(8) policy handling wherein policy |
|
verification could be completely bypassed in isakmpd. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=msdosfs></a> |
|
<li><font color=#009000><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br> |
|
Some operations in msdosfs could result in a system panic. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=cd9660></a> |
|
<li><font color=#009000><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br> |
|
NFS exporting of CD filesystems caused a system panic. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=uselogin></a> |
|
<li><font color=#009000><strong>006: SECURITY FIX: June 6, 2000</strong></font><br> |
|
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not |
|
be used. On other operating systems, it results in a hole.<br> |
|
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it. |
|
<p> |
|
<a name=ipopts></a> |
|
<li><font color=#009000><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br> |
|
Parse IPv4 options more carefully. It is not yet clear if this can even be used |
|
to crash the machine remote or locally. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=route></a> |
|
<li><font color=#009000><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br> |
|
Certain routing table modifications by the superuser could cause a system panic. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=bridge></a> |
|
<li><font color=#009000><strong>003: SECURITY FIX: May 26, 2000</strong></font><br> |
|
It is possible to bypass the <i>learning</i> flag on an interface if frames |
|
go directly to the machine acting as a |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=ef></a> |
|
<li><font color=#009000><strong>002: DRIVER FIX: May 26, 2000</strong></font><br> |
|
The |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a> |
|
driver will complain when adding an address with ifconfig |
|
(ifconfig: SIOCAIFADDR: Invalid argument).<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=ipf></a> |
|
<li><font color=#009000><strong>001: SECURITY FIX: May 25, 2000</strong></font><br> |
|
A misuse of |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ipf&sektion=8">ipf(8)</a> |
|
<i>keep-state</i> rules can result in firewall rules being bypassed.<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch> |
|
A source code patch exists</a>, which remedies this problem, and updates ipf |
|
to version 3.3.16. |
|
<p> |
|
</ul> |
|
<p> |
|
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color=#e00000>i386</font></h3> |
<ul> |
<ul> |
<a name=xlhash></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>016: DRIVER BUG: July 2, 2000</strong></font><br> |
|
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a> |
|
driver supporting various 3com cards, had a bug which prevented the multicast |
|
filter from working correctly on the 3c905B, thus preventing many IPv6 things |
|
from working. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=ste></a> |
|
<li><font color=#009000><strong>015: DRIVER BUG: June 30, 2000</strong></font><br> |
|
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&sektion=4">ste(4)</a> |
|
driver supporting Ethernet cards based on the Sundance ST201 chipset |
|
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at |
|
boot-time. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
<a name=pcvt></a> |
|
<li><font color=#009000><strong>014: DRIVER BUG: June 30, 2000</strong></font><br> |
|
The PC console driver (PCVT) has two bugs. Display problems can result if |
|
reverse video mode is turned on or off twice in a row. This patch also |
|
fixes a problem with scrolling region handling that has been seen by many |
|
users trying to use the BitchX irc client with the screen program.<br> |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch> |
|
There is now a second revision of the source code patch which remedies this problem.</a> |
|
<p> |
|
<a name=if_an></a> |
|
<li><font color=#009000><strong>011: DRIVER BUG: June 17, 2000</strong></font><br> |
|
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&sektion=4">an(4)</a> |
|
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=mac68k></a> |
<a name=mac68k></a> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<li><h3><font color=#e00000>mac68k</font></h3> |
<ul> |
<ul> |
<a name=mac68k_arandom></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>022: INSTALLATION FIX: July 14, 2000</strong></font> |
|
<br> |
|
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all |
|
devices, specifically it does not make the <tt>/dev/arandom</tt> device |
|
needed for the userland crypto such as ssh to work. The problem shows itself |
|
when ssh-keygen fails to make RSA or DSA keys, resulting in messages like |
|
<b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>. |
|
<br> |
|
To work around this, once your machine is up and running run the following |
|
commands as root: |
|
<tt><pre> |
|
cd /dev |
|
./MAKEDEV arandom |
|
</pre></tt> |
|
<p> |
|
After doing this (and possibly installing one of the ssl27 packages), |
|
reboot your machine and it will generate ssh keys correctly. |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=sparc></a> |
<a name=sparc></a> |
|
|
<a name=amiga></a> |
<a name=amiga></a> |
<li><h3><font color=#e00000>amiga</font></h3> |
<li><h3><font color=#e00000>amiga</font></h3> |
<ul> |
<ul> |
<a name=amiga_cd></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br> |
|
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives |
|
files for installation, ie: |
|
<pre> |
|
-rw-r--r-- 1 root mirftp 20191465 Apr 29 14:27 base27.tar.gz |
|
-rw-r--r-- 1 root mirftp 20291753 May 13 19:33 base27.tgz |
|
-rw-r--r-- 1 root mirftp 13699507 Apr 29 14:26 comp27.tar.gz |
|
-rw-r--r-- 1 root mirftp 13748096 May 13 19:33 comp27.tgz |
|
-rw-r--r-- 1 root mirftp 1005376 Apr 29 14:26 etc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1010772 May 13 19:33 etc27.tgz |
|
-rw-r--r-- 1 root mirftp 2755567 Apr 29 14:26 game27.tar.gz |
|
-rw-r--r-- 1 root mirftp 2755624 May 13 19:33 game27.tgz |
|
-rw-r--r-- 1 root mirftp 5002872 Apr 29 14:26 man27.tar.gz |
|
-rw-r--r-- 1 root mirftp 5038896 May 13 19:33 man27.tgz |
|
-rw-r--r-- 1 root mirftp 1684356 Apr 29 14:26 misc27.tar.gz |
|
-rw-r--r-- 1 root mirftp 1684381 May 13 19:33 misc27.tgz |
|
</pre> |
|
The installation script will list ALL of these files. For proper |
|
operation one should install the <b>*.tgz</b> versions, and deselect |
|
the <b>*.tar.gz</b> versions.<br> |
|
The FTP area sets do not suffer from this problem. |
|
<p> |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=pmax></a> |
<a name=pmax></a> |
<li><h3><font color=#e00000>pmax</font></h3> |
<li><h3><font color=#e00000>pmax</font></h3> |
<ul> |
<ul> |
<a name=pmax_msgbuf></a> |
<li>No problems identified yet. |
<li><font color=#009000><strong>020: KERNEL BUG: July 10, 2000</strong></font><br> |
|
As originally shipped, the pmax port would fail to install due to |
|
<b>/kern/msgbuf</b> bugs.<br> |
|
The neccessary fixes have been merged, |
|
and the binaries needed re-released on the FTP site.<br> |
|
However, the 2.7 <b>srcsys.tar.gz</b> file has not been updated.<br> |
|
If you recompile a kernel, you should use either the |
|
<a href=stable.html>stable release source tree</a> or apply the |
|
provided patch to a 2.7 source tree. |
|
<br> |
|
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
</ul> |
</ul> |
<p> |
<p> |
<a name=arc></a> |
<a name=hp300></a> |
<li><h3><font color=#e00000>arc</font></h3> |
<li><h3><font color=#e00000>hp300</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=alpha></a> |
<a name=mvme68k></a> |
<li><h3><font color=#e00000>alpha</font></h3> |
<li><h3><font color=#e00000>mvme68k</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=hp300></a> |
<a name=powerpc></a> |
<li><h3><font color=#e00000>hp300</font></h3> |
<li><h3><font color=#e00000>powerpc</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=mvme68k></a> |
<a name=vax></a> |
<li><h3><font color=#e00000>mvme68k</font></h3> |
<li><h3><font color=#e00000>vax</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
<p> |
<p> |
<a name=powerpc></a> |
<a name=sun3></a> |
<li><h3><font color=#e00000>powerpc</font></h3> |
<li><h3><font color=#e00000>sun3</font></h3> |
<ul> |
<ul> |
<li>No problems identified yet. |
<li>No problems identified yet. |
</ul> |
</ul> |
|
|
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br> |
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br> |
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br> |
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br> |
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br> |
|
<a href=errata27.html>For 2.7 errata, please refer here</a>.<br> |
<hr> |
<hr> |
|
|
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |