[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata27.html between version 1.36 and 1.37

version 1.36, 2003/10/24 22:12:40 version 1.37, 2003/11/21 16:55:16
Line 8 
Line 8 
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2001 by OpenBSD.">  <meta name="copyright" content="This document copyright 1997-2001 by OpenBSD.">
   <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
 <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">  <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">
Line 50 
Line 51 
 consult the <a href="./faq/faq10.html#10.14">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#10.14">OpenBSD FAQ</a>.
 <hr>  <hr>
   
 <dl>  <a name="all"></a>
 <a name=all></a>  <h3><font color="#e00000">All architectures</font></h3>
 <li><h3><font color="#e00000">All architectures</font></h3>  
 <ul>  <ul>
 <a name=readline></a>  <li><a name="readline"></a>
 <li><font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br>  <font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
 with a permissive  with a permissive
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.
Line 67 
Line 67 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch
 ">A source code patch exists which remedies the problem.</a><br>  ">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=sudo></a>  <li><a name="sudo"></a>
 <li><font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br>  <font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=ftpd></a>  <li><a name="ftpd"></a>
 <li><font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br>
 OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <a name=sshforwarding> </a>  <li><a name="sshforwarding"> </a>
 <li><font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br>
 Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
 This problem is fixed as of OpenSSH 2.3.0.<br>  This problem is fixed as of OpenSSH 2.3.0.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=execsubr> </a>  <li><a name="execsubr"> </a>
 <li><font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br>  <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br>
 Invalid fields in the exec header could cause a crash.<br>  Invalid fields in the exec header could cause a crash.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=xtrans> </a>  <li><a name="xtrans"> </a>
 <li><font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br>  <font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br>
 There are two possibly exploitable potential buffer overflows in the X11  There are two possibly exploitable potential buffer overflows in the X11
 libraries using the xtrans code. One of these vulnerabilities was  libraries using the xtrans code. One of these vulnerabilities was
 reported to the  reported to the
Line 104 
Line 104 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=httpd></a>  <li><a name="httpd"></a>
 <li><font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br>  <font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br>
 Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>  Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>
 that could cause arbitrary files accessible to the www user on the server  that could cause arbitrary files accessible to the www user on the server
 to be exposed under certain configurations when these modules are used.  to be exposed under certain configurations when these modules are used.
Line 114 
Line 114 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=telnetd></a>  <li><a name="telnetd"></a>
 <li><font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br>  <font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br>
 The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH  The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
 and TERMCAP (when it starts with a '/') environment variables.  and TERMCAP (when it starts with a '/') environment variables.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=sendmail></a>  <li><a name="sendmail"></a>
 <li><font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br>  <font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br>
 There is a non-exploitable buffer overflow in sendmail's test mode.  There is a non-exploitable buffer overflow in sendmail's test mode.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=format_strings></a>  <li><a name="format_strings"></a>
 <li><font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br>  <font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br>
 There are printf-style format string bugs in several privileged programs.  There are printf-style format string bugs in several privileged programs.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=curses></a>  <li><a name="curses"></a>
 <li><font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br>  <font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br>
 libcurses honored terminal descriptions in the $HOME/.terminfo directory  libcurses honored terminal descriptions in the $HOME/.terminfo directory
 as well as in the TERMCAP environment variable for setuid and setgid  as well as in the TERMCAP environment variable for setuid and setgid
 applications.  applications.
Line 145 
Line 145 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=talkd></a>  <li><a name="talkd"></a>
 <li><font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br>  <font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br>
 A format string vulnerability exists in talkd(8).  It is not clear  A format string vulnerability exists in talkd(8).  It is not clear
 yet what the impact is.  yet what the impact is.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=pw_error></a>  <li><a name="pw_error"></a>
 <li><font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br>  <font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br>
 A format string vulnerability exists in the pw_error(3) function.  This  A format string vulnerability exists in the pw_error(3) function.  This
 manifests itself as a security hole in the chpass utility.  As a workaround  manifests itself as a security hole in the chpass utility.  As a workaround
 which disables its functionality, do  which disables its functionality, do
Line 164 
Line 164 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ipsec></a>  <li><a name="ipsec"></a>
 <li><font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br>  <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br>
 Bad ESP/AH packets could cause a crash under certain conditions.  Bad ESP/AH packets could cause a crash under certain conditions.
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=xlock></a>  <li><a name="xlock"></a>
 <li><font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br>  <font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br>
 A format string vulnerability exists in xlock. As a workaround which disables  A format string vulnerability exists in xlock. As a workaround which disables
 its functionality, do  its functionality, do
 <pre>  <pre>
Line 180 
Line 180 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=X11_libs></a>  <li><a name="X11_libs"></a>
 <li><font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font><br>  <font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font><br>
 Various problems in X11 libraries have various side effects.  We provide a  Various problems in X11 libraries have various side effects.  We provide a
 jumbo patch to fix them.<p>  jumbo patch to fix them.<p>
 <ul>  <ul>
Line 211 
Line 211 
 ignore the build error.   The whatis database will be rebuilt the next  ignore the build error.   The whatis database will be rebuilt the next
 time /etc/weekly runs.  time /etc/weekly runs.
 <p>  <p>
 <a name=ftpd></a>  <li><a name="ftpd"></a>
 <li><font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font><br>  <font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font><br>
 Just like pretty much all the other unix ftp daemons on the planet,  Just like pretty much all the other unix ftp daemons on the planet,
 ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.  ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.
 The problem exists if anonymous ftp is enabled.  The problem exists if anonymous ftp is enabled.
Line 220 
Line 220 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=mopd></a>  <li><a name="mopd"></a>
 <li><font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font><br>  <font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font><br>
 Mopd contained a buffer overflow.  Mopd contained a buffer overflow.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=screen></a>  <li><a name="screen"></a>
 <li><font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>  <font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>
 <br>  <br>
 The screen package shipped with 2.7 does not install itself properly.  The  The screen package shipped with 2.7 does not install itself properly.  The
 existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to  existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to
Line 238 
Line 238 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=libedit></a>  <li><a name="libedit"></a>
 <li><font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font><br>  <font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font><br>
 libedit would check for a <b>.editrc</b> file in the current directory.  libedit would check for a <b>.editrc</b> file in the current directory.
 That behaviour is not nice; this does not turn into a security problem in  That behaviour is not nice; this does not turn into a security problem in
 any real world situation that we know of, but a patch is available anyways.  any real world situation that we know of, but a patch is available anyways.
Line 247 
Line 247 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=dhclient></a>  <li><a name="dhclient"></a>
 <li><font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font><br>  <font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font><br>
 A serious bug in dhclient(8) could allow strings from a malicious dhcp  A serious bug in dhclient(8) could allow strings from a malicious dhcp
 server to be executed in the shell as root.  server to be executed in the shell as root.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=isakmpd></a>  <li><a name="isakmpd"></a>
 <li><font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font><br>  <font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font><br>
 A serious bug in isakmpd(8) policy handling wherein policy  A serious bug in isakmpd(8) policy handling wherein policy
 verification could be completely bypassed in isakmpd.  verification could be completely bypassed in isakmpd.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=msdosfs></a>  <li><a name="msdosfs"></a>
 <li><font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br>  <font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br>
 Some operations in msdosfs could result in a system panic.  Some operations in msdosfs could result in a system panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=cd9660></a>  <li><a name="cd9660"></a>
 <li><font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br>  <font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br>
 NFS exporting of CD filesystems caused a system panic.  NFS exporting of CD filesystems caused a system panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=uselogin></a>  <li><a name="uselogin"></a>
 <li><font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font><br>  <font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font><br>
 The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not  The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not
 be used.  On other operating systems, it results in a hole.<br>  be used.  On other operating systems, it results in a hole.<br>
 Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.  Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.
 <p>  <p>
 <a name=ipopts></a>  <li><a name="ipopts"></a>
 <li><font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br>  <font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br>
 Parse IPv4 options more carefully.  It is not yet clear if this can even be used  Parse IPv4 options more carefully.  It is not yet clear if this can even be used
 to crash the machine remote or locally.  to crash the machine remote or locally.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=route></a>  <li><a name="route"></a>
 <li><font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br>  <font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br>
 Certain routing table modifications by the superuser could cause a system panic.  Certain routing table modifications by the superuser could cause a system panic.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=bridge></a>  <li><a name="bridge"></a>
 <li><font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font><br>  <font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font><br>
 It is possible to bypass the <i>learning</i> flag on an interface if frames  It is possible to bypass the <i>learning</i> flag on an interface if frames
 go directly to the machine acting as a  go directly to the machine acting as a
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&amp;sektion=4">bridge</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&amp;sektion=4">bridge</a>.
Line 307 
Line 307 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ef></a>  <li><a name="ef"></a>
 <li><font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font><br>  <font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font><br>
 The  The
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&amp;sektion=4">ef(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&amp;sektion=4">ef(4)</a>
 driver will complain when adding an address with ifconfig  driver will complain when adding an address with ifconfig
Line 316 
Line 316 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ipf></a>  <li><a name="ipf"></a>
 <li><font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font><br>  <font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font><br>
 A misuse of ipf(8)  A misuse of ipf(8)
 <i>keep-state</i> rules can result in firewall rules being bypassed.<br>  <i>keep-state</i> rules can result in firewall rules being bypassed.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch">
Line 326 
Line 326 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=i386></a>  <a name="i386"></a>
 <li><h3><font color="#e00000">i386</font></h3>  <h3><font color="#e00000">i386</font></h3>
 <ul>  <ul>
 <a name=xlhash></a>  <li><a name="xlhash"></a>
 <li><font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>  <font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&amp;sektion=4">xl(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&amp;sektion=4">xl(4)</a>
 driver supporting various 3com cards, had a bug which prevented the multicast  driver supporting various 3com cards, had a bug which prevented the multicast
 filter from working correctly on the 3c905B, thus preventing many IPv6 things  filter from working correctly on the 3c905B, thus preventing many IPv6 things
Line 339 
Line 339 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ste></a>  <li><a name="ste"></a>
 <li><font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>  <font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&amp;sektion=4">ste(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&amp;sektion=4">ste(4)</a>
 driver supporting Ethernet cards based on the Sundance ST201 chipset  driver supporting Ethernet cards based on the Sundance ST201 chipset
 (i.e., the D-Link 550TX) has a bug which causes the machine to panic at  (i.e., the D-Link 550TX) has a bug which causes the machine to panic at
Line 349 
Line 349 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=pcvt></a>  <li><a name="pcvt"></a>
 <li><font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>  <font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>
 The PC console driver (PCVT) has two bugs. Display problems can result if  The PC console driver (PCVT) has two bugs. Display problems can result if
 reverse video mode is turned on or off twice in a row. This patch also  reverse video mode is turned on or off twice in a row. This patch also
 fixes a problem with scrolling region handling that has been seen by many  fixes a problem with scrolling region handling that has been seen by many
Line 359 
Line 359 
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch">
 There is now a second revision of the source code patch which remedies this problem.</a>  There is now a second revision of the source code patch which remedies this problem.</a>
 <p>  <p>
 <a name=if_an></a>  <li><a name="if_an"></a>
 <li><font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>  <font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&amp;sektion=4">an(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&amp;sektion=4">an(4)</a>
 Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents  Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&amp;sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&amp;sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.
Line 370 
Line 370 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=mac68k></a>  <a name="mac68k"></a>
 <li><h3><font color="#e00000">mac68k</font></h3>  <h3><font color="#e00000">mac68k</font></h3>
 <ul>  <ul>
 <a name=mac68k_arandom></a>  <li><a name="mac68k_arandom"></a>
 <li><font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>  <font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>
 <br>  <br>
 The MacOS installer shipped with OpenBSD 2.7 does not correctly make all  The MacOS installer shipped with OpenBSD 2.7 does not correctly make all
 devices, specifically it does not make the <tt>/dev/arandom</tt> device  devices, specifically it does not make the <tt>/dev/arandom</tt> device
Line 384 
Line 384 
 <br>  <br>
 To work around this, once your machine is up and running run the following  To work around this, once your machine is up and running run the following
 commands as root:  commands as root:
 <tt><pre>  <pre>
 # cd /dev  # cd /dev
 # ./MAKEDEV arandom  # ./MAKEDEV arandom
 </pre></tt>  </pre>
 <p>  <p>
 After doing this (and possibly installing one of the ssl27 packages),  After doing this (and possibly installing one of the ssl27 packages),
 reboot your machine and it will generate ssh keys correctly.  reboot your machine and it will generate ssh keys correctly.
 </ul>  </ul>
 <p>  <p>
 <a name=sparc></a>  <a name="sparc"></a>
 <li><h3><font color="#e00000">sparc</font></h3>  <h3><font color="#e00000">sparc</font></h3>
 <ul>  <ul>
 <a name=qe> </a>  <li><a name="qe"> </a>
 <li><font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=zsconsole> </a>  <li><a name="zsconsole"> </a>
 <li><font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">
Line 411 
Line 411 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=amiga></a>  <a name="amiga"></a>
 <li><h3><font color="#e00000">amiga</font></h3>  <h3><font color="#e00000">amiga</font></h3>
 <ul>  <ul>
 <a name=amiga_cd></a>  <li><a name="amiga_cd"></a>
 <li><font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>  <font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>
 On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives  On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives
 files for installation, ie:  files for installation, ie:
 <pre>  <pre>
Line 439 
Line 439 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=pmax></a>  <a name="pmax"></a>
 <li><h3><font color="#e00000">pmax</font></h3>  <h3><font color="#e00000">pmax</font></h3>
 <ul>  <ul>
 <a name=pmax_msgbuf></a>  <li><a name="pmax_msgbuf"></a>
 <li><font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>  <font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>
 As originally shipped, the pmax port would fail to install due to  As originally shipped, the pmax port would fail to install due to
 <b>/kern/msgbuf</b> bugs.<br>  <b>/kern/msgbuf</b> bugs.<br>
 The necessary fixes have been merged,  The necessary fixes have been merged,
Line 458 
Line 458 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=arc></a>  <a name="arc"></a>
 <li><h3><font color="#e00000">arc</font></h3>  <h3><font color="#e00000">arc</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=alpha></a>  <a name="alpha"></a>
 <li><h3><font color="#e00000">alpha</font></h3>  <h3><font color="#e00000">alpha</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=hp300></a>  <a name="hp300"></a>
 <li><h3><font color="#e00000">hp300</font></h3>  <h3><font color="#e00000">hp300</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=mvme68k></a>  <a name="mvme68k"></a>
 <li><h3><font color="#e00000">mvme68k</font></h3>  <h3><font color="#e00000">mvme68k</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=powerpc></a>  <a name="powerpc"></a>
 <li><h3><font color="#e00000">powerpc</font></h3>  <h3><font color="#e00000">powerpc</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
   
 </dl>  
 <br>  <br>
   
 <hr>  <hr>

Legend:
Removed from v.1.36  
changed lines
  Added in v.1.37