[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata27.html between version 1.72 and 1.73

version 1.72, 2014/10/02 14:34:45 version 1.73, 2015/02/14 04:36:51
Line 81 
Line 81 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="readline"></a>  <li id="readline">
 <font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font>  <font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
Line 95 
Line 95 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo"></a>  <li id="sudo">
 <font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font>  <font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
Line 104 
Line 104 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ftpd"></a>  <li id="ftpd">
 <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font>  <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="qe"> </a>  <li id="qe">
 <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshforwarding"> </a>  <li id="sshforwarding">
 <font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font>  <font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
Line 125 
Line 125 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="zsconsole"> </a>  <li id="zsconsole">
 <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="execsubr"> </a>  <li id="execsubr">
 <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font>  <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Invalid fields in the exec header could cause a crash.<br>  Invalid fields in the exec header could cause a crash.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xtrans"> </a>  <li id="xtrans">
 <font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font>  <font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There are two possibly exploitable potential buffer overflows in the X11  There are two possibly exploitable potential buffer overflows in the X11
Line 151 
Line 151 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>  Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>
Line 162 
Line 162 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="telnetd"></a>  <li id="telnetd">
 <font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH  The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
Line 171 
Line 171 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font>  <font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is a non-exploitable buffer overflow in sendmail's test mode.  There is a non-exploitable buffer overflow in sendmail's test mode.
Line 179 
Line 179 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="format_strings"></a>  <li id="format_strings">
 <font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There are printf-style format string bugs in several privileged programs.  There are printf-style format string bugs in several privileged programs.
Line 187 
Line 187 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="curses"></a>  <li id="curses">
 <font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font>  <font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 libcurses honored terminal descriptions in the $HOME/.terminfo directory  libcurses honored terminal descriptions in the $HOME/.terminfo directory
Line 197 
Line 197 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="talkd"></a>  <li id="talkd">
 <font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in talkd(8).  It is not clear  A format string vulnerability exists in talkd(8).  It is not clear
Line 206 
Line 206 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pw_error"></a>  <li id="pw_error">
 <font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in the pw_error(3) function.  This  A format string vulnerability exists in the pw_error(3) function.  This
Line 218 
Line 218 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipsec"></a>  <li id="ipsec">
 <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bad ESP/AH packets could cause a crash under certain conditions.  Bad ESP/AH packets could cause a crash under certain conditions.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xlock"></a>  <li id="xlock">
 <font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in xlock. As a workaround which disables  A format string vulnerability exists in xlock. As a workaround which disables
Line 236 
Line 236 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="mac68k_arandom"></a>  <li id="mac68k_arandom">
 <font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>  <font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>
 <br>  <br>
 The MacOS installer shipped with OpenBSD 2.7 does not correctly make all  The MacOS installer shipped with OpenBSD 2.7 does not correctly make all
Line 255 
Line 255 
 After doing this (and possibly installing one of the ssl27 packages),  After doing this (and possibly installing one of the ssl27 packages),
 reboot your machine and it will generate ssh keys correctly.  reboot your machine and it will generate ssh keys correctly.
 <p>  <p>
 <li><a name="X11_libs"></a>  <li id="X11_libs">
 <font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Various problems in X11 libraries have various side effects.  We provide a  Various problems in X11 libraries have various side effects.  We provide a
Line 287 
Line 287 
 ignore the build error.   The whatis database will be rebuilt the next  ignore the build error.   The whatis database will be rebuilt the next
 time /etc/weekly runs.  time /etc/weekly runs.
 <p>  <p>
 <li><a name="pmax_msgbuf"></a>  <li id="pmax_msgbuf">
 <font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>  <font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>
 As originally shipped, the pmax port would fail to install due to  As originally shipped, the pmax port would fail to install due to
 <b>/kern/msgbuf</b> bugs.<br>  <b>/kern/msgbuf</b> bugs.<br>
Line 301 
Line 301 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ftpd"></a>  <li id="ftpd">
 <font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Just like pretty much all the other unix ftp daemons on the planet,  Just like pretty much all the other unix ftp daemons on the planet,
Line 311 
Line 311 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="mopd"></a>  <li id="mopd">
 <font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Mopd contained a buffer overflow.  Mopd contained a buffer overflow.
Line 319 
Line 319 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="screen"></a>  <li id="screen">
 <font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>  <font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The screen package shipped with 2.7 does not install itself properly.  The  The screen package shipped with 2.7 does not install itself properly.  The
Line 330 
Line 330 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xlhash"></a>  <li id="xlhash">
 <font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>  <font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&amp;sektion=4">xl(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&amp;sektion=4">xl(4)</a>
 driver supporting various 3com cards, had a bug which prevented the multicast  driver supporting various 3com cards, had a bug which prevented the multicast
Line 340 
Line 340 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ste"></a>  <li id="ste">
 <font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>  <font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&amp;sektion=4">ste(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&amp;sektion=4">ste(4)</a>
 driver supporting Ethernet cards based on the Sundance ST201 chipset  driver supporting Ethernet cards based on the Sundance ST201 chipset
Line 350 
Line 350 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pcvt"></a>  <li id="pcvt">
 <font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>  <font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>
 The PC console driver (PCVT) has two bugs. Display problems can result if  The PC console driver (PCVT) has two bugs. Display problems can result if
 reverse video mode is turned on or off twice in a row. This patch also  reverse video mode is turned on or off twice in a row. This patch also
Line 361 
Line 361 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is the second revision of the patch.  This is the second revision of the patch.
 <p>  <p>
 <li><a name="libedit"></a>  <li id="libedit">
 <font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 libedit would check for a <b>.editrc</b> file in the current directory.  libedit would check for a <b>.editrc</b> file in the current directory.
Line 371 
Line 371 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="dhclient"></a>  <li id="dhclient">
 <font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A serious bug in dhclient(8) could allow strings from a malicious dhcp  A serious bug in dhclient(8) could allow strings from a malicious dhcp
Line 380 
Line 380 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="if_an"></a>  <li id="if_an">
 <font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>  <font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&amp;sektion=4">an(4)</a>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&amp;sektion=4">an(4)</a>
 Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents  Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
Line 389 
Line 389 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="amiga_cd"></a>  <li id="amiga_cd">
 <font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>  <font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>
 On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives  On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives
 files for installation, ie:  files for installation, ie:
Line 412 
Line 412 
 the <b>*.tar.gz</b> versions.<br>  the <b>*.tar.gz</b> versions.<br>
 The FTP area sets do not suffer from this problem.  The FTP area sets do not suffer from this problem.
 <p>  <p>
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A serious bug in isakmpd(8) policy handling wherein policy  A serious bug in isakmpd(8) policy handling wherein policy
Line 421 
Line 421 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="msdosfs"></a>  <li id="msdosfs">
 <font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Some operations in msdosfs could result in a system panic.  Some operations in msdosfs could result in a system panic.
Line 429 
Line 429 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cd9660"></a>  <li id="cd9660">
 <font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 NFS exporting of CD filesystems caused a system panic.  NFS exporting of CD filesystems caused a system panic.
Line 437 
Line 437 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uselogin"></a>  <li id="uselogin">
 <font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not  The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not
 be used.  On other operating systems, it results in a hole.<br>  be used.  On other operating systems, it results in a hole.<br>
 Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.  Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.
 <p>  <p>
 <li><a name="ipopts"></a>  <li id="ipopts">
 <font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Parse IPv4 options more carefully.  It is not yet clear if this can even be used  Parse IPv4 options more carefully.  It is not yet clear if this can even be used
Line 453 
Line 453 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="route"></a>  <li id="route">
 <font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Certain routing table modifications by the superuser could cause a system panic.  Certain routing table modifications by the superuser could cause a system panic.
Line 461 
Line 461 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bridge"></a>  <li id="bridge">
 <font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font>  <font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to bypass the <i>learning</i> flag on an interface if frames  It is possible to bypass the <i>learning</i> flag on an interface if frames
Line 471 
Line 471 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ef"></a>  <li id="ef">
 <font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font>  <font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The  The
Line 481 
Line 481 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipf"></a>  <li id="ipf">
 <font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A misuse of ipf(8)  A misuse of ipf(8)

Legend:
Removed from v.1.72  
changed lines
  Added in v.1.73