[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata27.html between version 1.32 and 1.33

version 1.32, 2002/10/17 21:38:38 version 1.33, 2003/03/06 21:44:07
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC  "-//IETF//DTD HTML Strict//EN">  <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
 <html>  <html>
 <head>  <head>
 <title>OpenBSD 2.7 errata</title>  <title>OpenBSD 2.7 errata</title>
 <link rev=made href=mailto:www@openbsd.org>  <link rev=made href="mailto:www@openbsd.org">
 <meta name="resource-type" content="document">  <meta name="resource-type" content="document">
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
Line 13 
Line 13 
 <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">  <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">
   
 <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>  <a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
 <h2><font color=#0000e0>  <h2><font color="#0000e0">
 This is the OpenBSD 2.7 release errata &amp; patch list:  This is the OpenBSD 2.7 release errata &amp; patch list:
   
 </font></h2>  </font></h2>
Line 36 
Line 36 
 <br>  <br>
 <hr>  <hr>
   
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 50 
Line 50 
   
 <dl>  <dl>
 <a name=all></a>  <a name=all></a>
 <li><h3><font color=#e00000>All architectures</font></h3>  <li><h3><font color="#e00000">All architectures</font></h3>
 <ul>  <ul>
 <a name=readline></a>  <a name=readline></a>
 <li><font color=#009000><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br>  <li><font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
 with a permissive  with a permissive
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.
 This can lead to the leakage of sensitive information in applications  This can lead to the leakage of sensitive information in applications
 that use passwords and the like during user interaction (one such  that use passwords and the like during user interaction (one such
 application is mysql).  Additionally, if the HOME environment variable  application is mysql).  Additionally, if the HOME environment variable
Line 66 
Line 66 
 ">A source code patch exists which remedies the problem.</a><br>  ">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=sudo></a>  <a name=sudo></a>
 <li><font color=#009000><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br>  <li><font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <a name=ftpd></a>  <a name=ftpd></a>
 <li><font color=#009000><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br>  <li><font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br>
 OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <a name=sshforwarding> </a>  <a name=sshforwarding> </a>
 <li><font color=#009000><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br>  <li><font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br>
 Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
 This problem is fixed as of OpenSSH 2.3.0.<br>  This problem is fixed as of OpenSSH 2.3.0.<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=execsubr> </a>  <a name=execsubr> </a>
 <li><font color=#009000><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br>  <li><font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br>
 Invalid fields in the exec header could cause a crash.<br>  Invalid fields in the exec header could cause a crash.<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=xtrans> </a>  <a name=xtrans> </a>
 <li><font color=#009000><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br>  <li><font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br>
 There are two possibly exploitable potential buffer overflows in the X11  There are two possibly exploitable potential buffer overflows in the X11
 libraries using the xtrans code. One of these vulnerabilities was  libraries using the xtrans code. One of these vulnerabilities was
 reported to the  reported to the
 <a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a>  <a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a>
 mailing list.  mailing list.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=httpd></a>  <a name=httpd></a>
 <li><font color=#009000><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br>  <li><font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br>
 Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>  Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>
 that could cause arbitrary files accessible to the www user on the server  that could cause arbitrary files accessible to the www user on the server
 to be exposed under certain configurations when these modules are used.  to be exposed under certain configurations when these modules are used.
 (These modules are not active by default).  (These modules are not active by default).
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=telnetd></a>  <a name=telnetd></a>
 <li><font color=#009000><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br>  <li><font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br>
 The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH  The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
 and TERMCAP (when it starts with a '/') environment variables.  and TERMCAP (when it starts with a '/') environment variables.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=sendmail></a>  <a name=sendmail></a>
 <li><font color=#009000><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br>  <li><font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br>
 There is a non-exploitable buffer overflow in sendmail's test mode.  There is a non-exploitable buffer overflow in sendmail's test mode.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=format_strings></a>  <a name=format_strings></a>
 <li><font color=#009000><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br>  <li><font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br>
 There are printf-style format string bugs in several privileged programs.  There are printf-style format string bugs in several privileged programs.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=curses></a>  <a name=curses></a>
 <li><font color=#009000><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br>  <li><font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br>
 libcurses honored terminal descriptions in the $HOME/.terminfo directory  libcurses honored terminal descriptions in the $HOME/.terminfo directory
 as well as in the TERMCAP environment variable for setuid and setgid  as well as in the TERMCAP environment variable for setuid and setgid
 applications.  applications.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=talkd></a>  <a name=talkd></a>
 <li><font color=#009000><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br>  <li><font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br>
 A format string vulnerability exists in talkd(8).  It is not clear  A format string vulnerability exists in talkd(8).  It is not clear
 yet what the impact is.  yet what the impact is.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=pw_error></a>  <a name=pw_error></a>
 <li><font color=#009000><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br>  <li><font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br>
 A format string vulnerability exists in the pw_error(3) function.  This  A format string vulnerability exists in the pw_error(3) function.  This
 manifests itself as a security hole in the chpass utility.  As a workaround  manifests itself as a security hole in the chpass utility.  As a workaround
 which disables its functionality, do  which disables its functionality, do
 <pre>  <pre>
 # chmod u-s /usr/bin/chpass  # chmod u-s /usr/bin/chpass
 </pre>  </pre>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ipsec></a>  <a name=ipsec></a>
 <li><font color=#009000><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br>  <li><font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br>
 Bad ESP/AH packets could cause a crash under certain conditions.  Bad ESP/AH packets could cause a crash under certain conditions.
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch><br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=xlock></a>  <a name=xlock></a>
 <li><font color=#009000><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br>  <li><font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br>
 A format string vulnerability exists in xlock. As a workaround which disables  A format string vulnerability exists in xlock. As a workaround which disables
 its functionality, do  its functionality, do
 <pre>  <pre>
 # chmod u-s /usr/X11R6/bin/xlock  # chmod u-s /usr/X11R6/bin/xlock
 </pre>  </pre>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=X11_libs></a>  <a name=X11_libs></a>
 <li><font color=#009000><strong>021: SECURITY FIX: July 14, 2000</strong></font><br>  <li><font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font><br>
 Various problems in X11 libraries have various side effects.  We provide a  Various problems in X11 libraries have various side effects.  We provide a
 jumbo patch to fix them.<p>  jumbo patch to fix them.<p>
 <ul>  <ul>
     <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-15&msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk">      <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&amp;date=2000-05-15&amp;msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk">
     Nasty X Server Dos</a><br>      Nasty X Server Dos</a><br>
     This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>.      This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>.
     <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk">      <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&amp;date=2000-06-15&amp;msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk">
     Various nasty libX11 holes</a><br>      Various nasty libX11 holes</a><br>
     This is covered by the patches to <b>xc/lib/X11</b>.      This is covered by the patches to <b>xc/lib/X11</b>.
     <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk">      <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&amp;date=2000-06-15&amp;msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk">
     libICE DoS</a><br>      libICE DoS</a><br>
     This is covered by the patches to <b>xc/lib/ICE</b>.      This is covered by the patches to <b>xc/lib/ICE</b>.
     <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=Pine.LNX.4.10.10004161835150.863-100000@localhost">      <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&amp;date=2000-04-15&amp;msg=Pine.LNX.4.10.10004161835150.863-100000@localhost">
     Server overflow</a><br>      Server overflow</a><br>
     This is covered by the patches to <b>xc/programs/Xserver/xkb</b>.      This is covered by the patches to <b>xc/programs/Xserver/xkb</b>.
     <br>      <br>
Line 200 
Line 200 
     the XFree86 Xwrapper already has tests for bad arguments.      the XFree86 Xwrapper already has tests for bad arguments.
 </ul>  </ul>
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch">
 A source code patch exists which remedies these problems.</a><br>  A source code patch exists which remedies these problems.</a><br>
 <strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>  <strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>
 <strong>Note 2:</strong> When re-building use the command  <strong>Note 2:</strong> When re-building use the command
Line 210 
Line 210 
 time /etc/weekly runs.  time /etc/weekly runs.
 <p>  <p>
 <a name=ftpd></a>  <a name=ftpd></a>
 <li><font color=#009000><strong>019: SECURITY FIX: July 5, 2000</strong></font><br>  <li><font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font><br>
 Just like pretty much all the other unix ftp daemons on the planet,  Just like pretty much all the other unix ftp daemons on the planet,
 ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.  ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.
 The problem exists if anonymous ftp is enabled.  The problem exists if anonymous ftp is enabled.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=mopd></a>  <a name=mopd></a>
 <li><font color=#009000><strong>018: SECURITY FIX: July 5, 2000</strong></font><br>  <li><font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font><br>
 Mopd contained a buffer overflow.  Mopd contained a buffer overflow.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=screen></a>  <a name=screen></a>
 <li><font color=#009000><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>  <li><font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>
 <br>  <br>
 The screen package shipped with 2.7 does not install itself properly.  The  The screen package shipped with 2.7 does not install itself properly.  The
 existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to  existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to
 screen-3.9.5.tgz.old and a replacement package has been provided under the  screen-3.9.5.tgz.old and a replacement package has been provided under the
 name screen-3.9.5p1.tgz.  name screen-3.9.5p1.tgz.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=libedit></a>  <a name=libedit></a>
 <li><font color=#009000><strong>013: SECURITY FIX: June 28, 2000</strong></font><br>  <li><font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font><br>
 libedit would check for a <b>.editrc</b> file in the current directory.  libedit would check for a <b>.editrc</b> file in the current directory.
 That behaviour is not nice; this does not turn into a security problem in  That behaviour is not nice; this does not turn into a security problem in
 any real world situation that we know of, but a patch is available anyways.  any real world situation that we know of, but a patch is available anyways.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=dhclient></a>  <a name=dhclient></a>
 <li><font color=#009000><strong>012: SECURITY FIX: June 24, 2000</strong></font><br>  <li><font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font><br>
 A serious bug in dhclient(8) could allow strings from a malicious dhcp  A serious bug in dhclient(8) could allow strings from a malicious dhcp
 server to be executed in the shell as root.  server to be executed in the shell as root.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=isakmpd></a>  <a name=isakmpd></a>
 <li><font color=#009000><strong>009: SECURITY FIX: June 9, 2000</strong></font><br>  <li><font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font><br>
 A serious bug in isakmpd(8) policy handling wherein policy  A serious bug in isakmpd(8) policy handling wherein policy
 verification could be completely bypassed in isakmpd.  verification could be completely bypassed in isakmpd.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=msdosfs></a>  <a name=msdosfs></a>
 <li><font color=#009000><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br>  <li><font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br>
 Some operations in msdosfs could result in a system panic.  Some operations in msdosfs could result in a system panic.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=cd9660></a>  <a name=cd9660></a>
 <li><font color=#009000><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br>  <li><font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br>
 NFS exporting of CD filesystems caused a system panic.  NFS exporting of CD filesystems caused a system panic.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=uselogin></a>  <a name=uselogin></a>
 <li><font color=#009000><strong>006: SECURITY FIX: June 6, 2000</strong></font><br>  <li><font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font><br>
 The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not  The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not
 be used.  On other operating systems, it results in a hole.<br>  be used.  On other operating systems, it results in a hole.<br>
 Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.  Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.
 <p>  <p>
 <a name=ipopts></a>  <a name=ipopts></a>
 <li><font color=#009000><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br>  <li><font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br>
 Parse IPv4 options more carefully.  It is not yet clear if this can even be used  Parse IPv4 options more carefully.  It is not yet clear if this can even be used
 to crash the machine remote or locally.  to crash the machine remote or locally.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=route></a>  <a name=route></a>
 <li><font color=#009000><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br>  <li><font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br>
 Certain routing table modifications by the superuser could cause a system panic.  Certain routing table modifications by the superuser could cause a system panic.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=bridge></a>  <a name=bridge></a>
 <li><font color=#009000><strong>003: SECURITY FIX: May 26, 2000</strong></font><br>  <li><font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font><br>
 It is possible to bypass the <i>learning</i> flag on an interface if frames  It is possible to bypass the <i>learning</i> flag on an interface if frames
 go directly to the machine acting as a  go directly to the machine acting as a
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&amp;sektion=4">bridge</a>.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ef></a>  <a name=ef></a>
 <li><font color=#009000><strong>002: DRIVER FIX: May 26, 2000</strong></font><br>  <li><font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font><br>
 The  The
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&amp;sektion=4">ef(4)</a>
 driver will complain when adding an address with ifconfig  driver will complain when adding an address with ifconfig
 (ifconfig: SIOCAIFADDR: Invalid argument).<br>  (ifconfig: SIOCAIFADDR: Invalid argument).<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ipf></a>  <a name=ipf></a>
 <li><font color=#009000><strong>001: SECURITY FIX: May 25, 2000</strong></font><br>  <li><font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font><br>
 A misuse of ipf(8)  A misuse of ipf(8)
 <i>keep-state</i> rules can result in firewall rules being bypassed.<br>  <i>keep-state</i> rules can result in firewall rules being bypassed.<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch">
 A source code patch exists</a>, which remedies this problem, and updates ipf  A source code patch exists</a>, which remedies this problem, and updates ipf
 to version 3.3.16.  to version 3.3.16.
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=i386></a>  <a name=i386></a>
 <li><h3><font color=#e00000>i386</font></h3>  <li><h3><font color="#e00000">i386</font></h3>
 <ul>  <ul>
 <a name=xlhash></a>  <a name=xlhash></a>
 <li><font color=#009000><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>  <li><font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&amp;sektion=4">xl(4)</a>
 driver supporting various 3com cards, had a bug which prevented the multicast  driver supporting various 3com cards, had a bug which prevented the multicast
 filter from working correctly on the 3c905B, thus preventing many IPv6 things  filter from working correctly on the 3c905B, thus preventing many IPv6 things
 from working.  from working.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=ste></a>  <a name=ste></a>
 <li><font color=#009000><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>  <li><font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&sektion=4">ste(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&amp;sektion=4">ste(4)</a>
 driver supporting Ethernet cards based on the Sundance ST201 chipset  driver supporting Ethernet cards based on the Sundance ST201 chipset
 (i.e., the D-Link 550TX) has a bug which causes the machine to panic at  (i.e., the D-Link 550TX) has a bug which causes the machine to panic at
 boot-time.  boot-time.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=pcvt></a>  <a name=pcvt></a>
 <li><font color=#009000><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>  <li><font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>
 The PC console driver (PCVT) has two bugs. Display problems can result if  The PC console driver (PCVT) has two bugs. Display problems can result if
 reverse video mode is turned on or off twice in a row. This patch also  reverse video mode is turned on or off twice in a row. This patch also
 fixes a problem with scrolling region handling that has been seen by many  fixes a problem with scrolling region handling that has been seen by many
 users trying to use the BitchX irc client with the screen program.<br>  users trying to use the BitchX irc client with the screen program.<br>
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch">
 There is now a second revision of the source code patch which remedies this problem.</a>  There is now a second revision of the source code patch which remedies this problem.</a>
 <p>  <p>
 <a name=if_an></a>  <a name=if_an></a>
 <li><font color=#009000><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>  <li><font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&sektion=4">an(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&amp;sektion=4">an(4)</a>
 Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents  Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&amp;sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=mac68k></a>  <a name=mac68k></a>
 <li><h3><font color=#e00000>mac68k</font></h3>  <li><h3><font color="#e00000">mac68k</font></h3>
 <ul>  <ul>
 <a name=mac68k_arandom></a>  <a name=mac68k_arandom></a>
 <li><font color=#009000><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>  <li><font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>
 <br>  <br>
 The MacOS installer shipped with OpenBSD 2.7 does not correctly make all  The MacOS installer shipped with OpenBSD 2.7 does not correctly make all
 devices, specifically it does not make the <tt>/dev/arandom</tt> device  devices, specifically it does not make the <tt>/dev/arandom</tt> device
Line 392 
Line 392 
 </ul>  </ul>
 <p>  <p>
 <a name=sparc></a>  <a name=sparc></a>
 <li><h3><font color=#e00000>sparc</font></h3>  <li><h3><font color="#e00000">sparc</font></h3>
 <ul>  <ul>
 <a name=qe> </a>  <a name=qe> </a>
 <li><font color=#009000><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <li><font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <a name=zsconsole> </a>  <a name=zsconsole> </a>
 <li><font color=#009000><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <li><font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=amiga></a>  <a name=amiga></a>
 <li><h3><font color=#e00000>amiga</font></h3>  <li><h3><font color="#e00000">amiga</font></h3>
 <ul>  <ul>
 <a name=amiga_cd></a>  <a name=amiga_cd></a>
 <li><font color=#009000><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>  <li><font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>
 On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives  On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives
 files for installation, ie:  files for installation, ie:
 <pre>  <pre>
Line 438 
Line 438 
 </ul>  </ul>
 <p>  <p>
 <a name=pmax></a>  <a name=pmax></a>
 <li><h3><font color=#e00000>pmax</font></h3>  <li><h3><font color="#e00000">pmax</font></h3>
 <ul>  <ul>
 <a name=pmax_msgbuf></a>  <a name=pmax_msgbuf></a>
 <li><font color=#009000><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>  <li><font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>
 As originally shipped, the pmax port would fail to install due to  As originally shipped, the pmax port would fail to install due to
 <b>/kern/msgbuf</b> bugs.<br>  <b>/kern/msgbuf</b> bugs.<br>
 The necessary fixes have been merged,  The necessary fixes have been merged,
Line 451 
Line 451 
 <a href=stable.html>stable release source tree</a> or apply the  <a href=stable.html>stable release source tree</a> or apply the
 provided patch to a 2.7 source tree.  provided patch to a 2.7 source tree.
 <br>  <br>
 <a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name=arc></a>  <a name=arc></a>
 <li><h3><font color=#e00000>arc</font></h3>  <li><h3><font color="#e00000">arc</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=alpha></a>  <a name=alpha></a>
 <li><h3><font color=#e00000>alpha</font></h3>  <li><h3><font color="#e00000">alpha</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=hp300></a>  <a name=hp300></a>
 <li><h3><font color=#e00000>hp300</font></h3>  <li><h3><font color="#e00000">hp300</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=mvme68k></a>  <a name=mvme68k></a>
 <li><h3><font color=#e00000>mvme68k</font></h3>  <li><h3><font color="#e00000">mvme68k</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
 <p>  <p>
 <a name=powerpc></a>  <a name=powerpc></a>
 <li><h3><font color=#e00000>powerpc</font></h3>  <li><h3><font color="#e00000">powerpc</font></h3>
 <ul>  <ul>
 <li>No problems identified yet.  <li>No problems identified yet.
 </ul>  </ul>
Line 508 
Line 508 
   
 <hr>  <hr>
 <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>  <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>
 <a href=mailto:www@openbsd.org>www@openbsd.org</a>  <a href="mailto:www@openbsd.org">www@openbsd.org</a>
 <br><small>$OpenBSD$</small>  <br><small>$OpenBSD$</small>
   
 </body>  </body>

Legend:
Removed from v.1.32  
changed lines
  Added in v.1.33