[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata27.html between version 1.85 and 1.86

version 1.85, 2016/08/15 02:22:06 version 1.86, 2016/10/16 19:11:29
Line 70 
Line 70 
 <br>  <br>
 <hr>  <hr>
   
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
 <p>  <p>
Line 97 
Line 97 
 application is mysql).  Additionally, if the HOME environment variable  application is mysql).  Additionally, if the HOME environment variable
 is not set, the current working directory is used; this patch disables  is not set, the current working directory is used; this patch disables
 the history file if HOME is not set.<br>  the history file if HOME is not set.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sudo">  <li id="sudo">
Line 106 
Line 106 
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://man.openbsd.org/?query=sudo&amp;sektion=8">sudo</a>.  <a href="http://man.openbsd.org/?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ftpd">  <li id="ftpd">
 <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font>  <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="qe">  <li id="qe">
 <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sshforwarding">  <li id="sshforwarding">
Line 127 
Line 127 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
 This problem is fixed as of OpenSSH 2.3.0.<br>  This problem is fixed as of OpenSSH 2.3.0.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="zsconsole">  <li id="zsconsole">
 <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="execsubr">  <li id="execsubr">
 <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font>  <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Invalid fields in the exec header could cause a crash.<br>  Invalid fields in the exec header could cause a crash.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xtrans">  <li id="xtrans">
Line 153 
Line 153 
 <a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a>  <a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a>
 mailing list.  mailing list.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd">  <li id="httpd">
Line 164 
Line 164 
 to be exposed under certain configurations when these modules are used.  to be exposed under certain configurations when these modules are used.
 (These modules are not active by default).  (These modules are not active by default).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="telnetd">  <li id="telnetd">
Line 173 
Line 173 
 The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH  The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
 and TERMCAP (when it starts with a '/') environment variables.  and TERMCAP (when it starts with a '/') environment variables.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sendmail">  <li id="sendmail">
Line 181 
Line 181 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is a non-exploitable buffer overflow in sendmail's test mode.  There is a non-exploitable buffer overflow in sendmail's test mode.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="format_strings">  <li id="format_strings">
Line 189 
Line 189 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There are printf-style format string bugs in several privileged programs.  There are printf-style format string bugs in several privileged programs.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="curses">  <li id="curses">
Line 199 
Line 199 
 as well as in the TERMCAP environment variable for setuid and setgid  as well as in the TERMCAP environment variable for setuid and setgid
 applications.  applications.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="talkd">  <li id="talkd">
Line 208 
Line 208 
 A format string vulnerability exists in talkd(8).  It is not clear  A format string vulnerability exists in talkd(8).  It is not clear
 yet what the impact is.  yet what the impact is.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pw_error">  <li id="pw_error">
Line 220 
Line 220 
 <pre>  <pre>
 # chmod u-s /usr/bin/chpass  # chmod u-s /usr/bin/chpass
 </pre>  </pre>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ipsec">  <li id="ipsec">
 <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bad ESP/AH packets could cause a crash under certain conditions.  Bad ESP/AH packets could cause a crash under certain conditions.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xlock">  <li id="xlock">
Line 238 
Line 238 
 <pre>  <pre>
 # chmod u-s /usr/X11R6/bin/xlock  # chmod u-s /usr/X11R6/bin/xlock
 </pre>  </pre>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="mac68k_arandom">  <li id="mac68k_arandom">
Line 283 
Line 283 
     the XFree86 Xwrapper already has tests for bad arguments.      the XFree86 Xwrapper already has tests for bad arguments.
 </ul>  </ul>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>  <strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>
 <strong>Note 2:</strong> When re-building use the command  <strong>Note 2:</strong> When re-building use the command
Line 303 
Line 303 
 <a href=stable.html>stable release source tree</a> or apply the  <a href=stable.html>stable release source tree</a> or apply the
 provided patch to a 2.7 source tree.  provided patch to a 2.7 source tree.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ftpd">  <li id="ftpd">
Line 313 
Line 313 
 ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.  ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.
 The problem exists if anonymous ftp is enabled.  The problem exists if anonymous ftp is enabled.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="mopd">  <li id="mopd">
Line 321 
Line 321 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Mopd contained a buffer overflow.  Mopd contained a buffer overflow.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="screen">  <li id="screen">
Line 332 
Line 332 
 screen-3.9.5.tgz.old and a replacement package has been provided under the  screen-3.9.5.tgz.old and a replacement package has been provided under the
 name screen-3.9.5p1.tgz.  name screen-3.9.5p1.tgz.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xlhash">  <li id="xlhash">
Line 342 
Line 342 
 filter from working correctly on the 3c905B, thus preventing many IPv6 things  filter from working correctly on the 3c905B, thus preventing many IPv6 things
 from working.  from working.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ste">  <li id="ste">
Line 352 
Line 352 
 (i.e., the D-Link 550TX) has a bug which causes the machine to panic at  (i.e., the D-Link 550TX) has a bug which causes the machine to panic at
 boot-time.  boot-time.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pcvt">  <li id="pcvt">
Line 362 
Line 362 
 fixes a problem with scrolling region handling that has been seen by many  fixes a problem with scrolling region handling that has been seen by many
 users trying to use the BitchX irc client with the screen program.<br>  users trying to use the BitchX irc client with the screen program.<br>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is the second revision of the patch.  This is the second revision of the patch.
 <p>  <p>
Line 373 
Line 373 
 That behaviour is not nice; this does not turn into a security problem in  That behaviour is not nice; this does not turn into a security problem in
 any real world situation that we know of, but a patch is available anyways.  any real world situation that we know of, but a patch is available anyways.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="dhclient">  <li id="dhclient">
Line 382 
Line 382 
 A serious bug in dhclient(8) could allow strings from a malicious dhcp  A serious bug in dhclient(8) could allow strings from a malicious dhcp
 server to be executed in the shell as root.  server to be executed in the shell as root.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="if_an">  <li id="if_an">
Line 391 
Line 391 
 Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents  Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
 <a href="http://man.openbsd.org/?query=ancontrol&amp;sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.  <a href="http://man.openbsd.org/?query=ancontrol&amp;sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="amiga_cd">  <li id="amiga_cd">
Line 423 
Line 423 
 A serious bug in isakmpd(8) policy handling wherein policy  A serious bug in isakmpd(8) policy handling wherein policy
 verification could be completely bypassed in isakmpd.  verification could be completely bypassed in isakmpd.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="msdosfs">  <li id="msdosfs">
Line 431 
Line 431 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Some operations in msdosfs could result in a system panic.  Some operations in msdosfs could result in a system panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cd9660">  <li id="cd9660">
Line 439 
Line 439 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 NFS exporting of CD filesystems caused a system panic.  NFS exporting of CD filesystems caused a system panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="uselogin">  <li id="uselogin">
Line 455 
Line 455 
 Parse IPv4 options more carefully.  It is not yet clear if this can even be used  Parse IPv4 options more carefully.  It is not yet clear if this can even be used
 to crash the machine remote or locally.  to crash the machine remote or locally.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="route">  <li id="route">
Line 463 
Line 463 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Certain routing table modifications by the superuser could cause a system panic.  Certain routing table modifications by the superuser could cause a system panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="bridge">  <li id="bridge">
Line 473 
Line 473 
 go directly to the machine acting as a  go directly to the machine acting as a
 <a href="http://man.openbsd.org/?query=bridge&amp;sektion=4">bridge</a>.  <a href="http://man.openbsd.org/?query=bridge&amp;sektion=4">bridge</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ef">  <li id="ef">
Line 483 
Line 483 
 <a href="http://man.openbsd.org/?query=ef&amp;sektion=4">ef(4)</a>  <a href="http://man.openbsd.org/?query=ef&amp;sektion=4">ef(4)</a>
 driver will complain when adding an address with ifconfig  driver will complain when adding an address with ifconfig
 (ifconfig: SIOCAIFADDR: Invalid argument).<br>  (ifconfig: SIOCAIFADDR: Invalid argument).<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ipf">  <li id="ipf">
Line 491 
Line 491 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A misuse of ipf(8)  A misuse of ipf(8)
 <i>keep-state</i> rules can result in firewall rules being bypassed.<br>  <i>keep-state</i> rules can result in firewall rules being bypassed.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 It updates ipf to version 3.3.16.  It updates ipf to version 3.3.16.
 <p>  <p>

Legend:
Removed from v.1.85  
changed lines
  Added in v.1.86