[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata27.html between version 1.94 and 1.95

version 1.94, 2019/04/02 12:46:56 version 1.95, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 2.7 Errata</title>  <title>OpenBSD 2.7 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata27.html">  <link rel="canonical" href="https://www.openbsd.org/errata27.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">2.7 Errata</font>  2.7 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 87 
Line 85 
   
 <ul>  <ul>
 <li id="readline">  <li id="readline">
 <font color="#009000"><strong>040: SECURITY FIX: Mar 18, 2001</strong></font>  <strong>040: SECURITY FIX: Mar 18, 2001</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
 with a permissive  with a permissive
Line 101 
Line 99 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sudo">  <li id="sudo">
 <font color="#009000"><strong>039: SECURITY FIX: Feb 22, 2001</strong></font>  <strong>039: SECURITY FIX: Feb 22, 2001</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="https://man.openbsd.org/OpenBSD-2.7/sudo.8">sudo</a>.  <a href="https://man.openbsd.org/OpenBSD-2.7/sudo.8">sudo</a>.
Line 110 
Line 108 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ftpd">  <li id="ftpd">
 <font color="#009000"><strong>037: SECURITY FIX: Dec 4, 2000</strong></font>  <strong>037: SECURITY FIX: Dec 4, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="qe">  <li id="qe">
 <font color="#009000"><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <strong>036: RELIABILITY FIX: Nov 17, 2000</strong><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sshforwarding">  <li id="sshforwarding">
 <font color="#009000"><strong>035: SECURITY FIX: Nov 10, 2000</strong></font>  <strong>035: SECURITY FIX: Nov 10, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Hostile servers can force OpenSSH clients to do agent or X11 forwarding.  Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
 This problem is fixed as of OpenSSH 2.3.0.<br>  This problem is fixed as of OpenSSH 2.3.0.<br>
Line 131 
Line 129 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="zsconsole">  <li id="zsconsole">
 <font color="#009000"><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <strong>034: RELIABILITY FIX: Nov 10, 2000</strong><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="execsubr">  <li id="execsubr">
 <font color="#009000"><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font>  <strong>033: RELIABILITY FIX: Nov 6, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Invalid fields in the exec header could cause a crash.<br>  Invalid fields in the exec header could cause a crash.<br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xtrans">  <li id="xtrans">
 <font color="#009000"><strong>032: SECURITY FIX: Oct 26, 2000</strong></font>  <strong>032: SECURITY FIX: Oct 26, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There are two possibly exploitable potential buffer overflows in the X11  There are two possibly exploitable potential buffer overflows in the X11
 libraries using the xtrans code. One of these vulnerabilities was  libraries using the xtrans code. One of these vulnerabilities was
Line 157 
Line 155 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>031: SECURITY FIX: Oct 18, 2000</strong></font>  <strong>031: SECURITY FIX: Oct 18, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt>  Apache has several bugs in <code>mod_rewrite</code> and <code>mod_vhost_alias</code>
 that could cause arbitrary files accessible to the www user on the server  that could cause arbitrary files accessible to the www user on the server
 to be exposed under certain configurations when these modules are used.  to be exposed under certain configurations when these modules are used.
 (These modules are not active by default).  (These modules are not active by default).
Line 168 
Line 166 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="telnetd">  <li id="telnetd">
 <font color="#009000"><strong>030: SECURITY FIX: Oct 10, 2000</strong></font>  <strong>030: SECURITY FIX: Oct 10, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH  The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
 and TERMCAP (when it starts with a '/') environment variables.  and TERMCAP (when it starts with a '/') environment variables.
Line 177 
Line 175 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sendmail">  <li id="sendmail">
 <font color="#009000"><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font>  <strong>029: RELIABILITY FIX: Oct 9, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is a non-exploitable buffer overflow in sendmail's test mode.  There is a non-exploitable buffer overflow in sendmail's test mode.
 <br>  <br>
Line 185 
Line 183 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="format_strings">  <li id="format_strings">
 <font color="#009000"><strong>028: SECURITY FIX: Oct 6, 2000</strong></font>  <strong>028: SECURITY FIX: Oct 6, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There are printf-style format string bugs in several privileged programs.  There are printf-style format string bugs in several privileged programs.
 <br>  <br>
Line 193 
Line 191 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="curses">  <li id="curses">
 <font color="#009000"><strong>027: SECURITY FIX: Oct 6, 2000</strong></font>  <strong>027: SECURITY FIX: Oct 6, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 libcurses honored terminal descriptions in the $HOME/.terminfo directory  libcurses honored terminal descriptions in the $HOME/.terminfo directory
 as well as in the TERMCAP environment variable for setuid and setgid  as well as in the TERMCAP environment variable for setuid and setgid
Line 203 
Line 201 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="talkd">  <li id="talkd">
 <font color="#009000"><strong>026: SECURITY FIX: Oct 6, 2000</strong></font>  <strong>026: SECURITY FIX: Oct 6, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in talkd(8).  It is not clear  A format string vulnerability exists in talkd(8).  It is not clear
 yet what the impact is.  yet what the impact is.
Line 212 
Line 210 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pw_error">  <li id="pw_error">
 <font color="#009000"><strong>025: SECURITY FIX: Oct 3, 2000</strong></font>  <strong>025: SECURITY FIX: Oct 3, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in the pw_error(3) function.  This  A format string vulnerability exists in the pw_error(3) function.  This
 manifests itself as a security hole in the chpass utility.  As a workaround  manifests itself as a security hole in the chpass utility.  As a workaround
Line 224 
Line 222 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ipsec">  <li id="ipsec">
 <font color="#009000"><strong>024: SECURITY FIX: Sep 18, 2000</strong></font>  <strong>024: SECURITY FIX: Sep 18, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bad ESP/AH packets could cause a crash under certain conditions.  Bad ESP/AH packets could cause a crash under certain conditions.
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch"><br>
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xlock">  <li id="xlock">
 <font color="#009000"><strong>023: SECURITY FIX: Aug 16, 2000</strong></font>  <strong>023: SECURITY FIX: Aug 16, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A format string vulnerability exists in xlock. As a workaround which disables  A format string vulnerability exists in xlock. As a workaround which disables
 its functionality, do  its functionality, do
Line 242 
Line 240 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="mac68k_arandom">  <li id="mac68k_arandom">
 <font color="#009000"><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>  <strong>022: INSTALLATION FIX: July 14, 2000</strong>
 <br>  <br>
 The MacOS installer shipped with OpenBSD 2.7 does not correctly make all  The MacOS installer shipped with OpenBSD 2.7 does not correctly make all
 devices, specifically it does not make the <tt>/dev/arandom</tt> device  devices, specifically it does not make the <code>/dev/arandom</code> device
 needed for the userland crypto such as ssh to work.  The problem shows itself  needed for the userland crypto such as ssh to work.  The problem shows itself
 when ssh-keygen fails to make RSA or DSA keys, resulting in messages like  when ssh-keygen fails to make RSA or DSA keys, resulting in messages like
 <b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>.  <b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>.
Line 261 
Line 259 
 reboot your machine and it will generate ssh keys correctly.  reboot your machine and it will generate ssh keys correctly.
 <p>  <p>
 <li id="X11_libs">  <li id="X11_libs">
 <font color="#009000"><strong>021: SECURITY FIX: July 14, 2000</strong></font>  <strong>021: SECURITY FIX: July 14, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Various problems in X11 libraries have various side effects.  We provide a  Various problems in X11 libraries have various side effects.  We provide a
 jumbo patch to fix them.<p>  jumbo patch to fix them.<p>
Line 285 
Line 283 
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>  <b>Note 1:</b> tcl/tk is required to build X11 from source.<br>
 <strong>Note 2:</strong> When re-building use the command  <b>Note 2:</b> When re-building use the command
 `make DESTDIR=/ build' or you will get an error in the last  'make DESTDIR=/ build' or you will get an error in the last
 step of the build (makewhatis).  If you forget to set DESTDIR you can  step of the build (makewhatis).  If you forget to set DESTDIR you can
 ignore the build error.   The whatis database will be rebuilt the next  ignore the build error.   The whatis database will be rebuilt the next
 time /etc/weekly runs.  time /etc/weekly runs.
 <p>  <p>
 <li id="pmax_msgbuf">  <li id="pmax_msgbuf">
 <font color="#009000"><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>  <strong>020: KERNEL BUG: July 10, 2000</strong><br>
 As originally shipped, the pmax port would fail to install due to  As originally shipped, the pmax port would fail to install due to
 <b>/kern/msgbuf</b> bugs.<br>  <b>/kern/msgbuf</b> bugs.<br>
 The necessary fixes have been merged,  The necessary fixes have been merged,
Line 307 
Line 305 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ftpd2">  <li id="ftpd2">
 <font color="#009000"><strong>019: SECURITY FIX: July 5, 2000</strong></font>  <strong>019: SECURITY FIX: July 5, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Just like pretty much all the other unix ftp daemons on the planet,  Just like pretty much all the other unix ftp daemons on the planet,
 ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.  ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.
Line 317 
Line 315 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="mopd">  <li id="mopd">
 <font color="#009000"><strong>018: SECURITY FIX: July 5, 2000</strong></font>  <strong>018: SECURITY FIX: July 5, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Mopd contained a buffer overflow.  Mopd contained a buffer overflow.
 <br>  <br>
Line 325 
Line 323 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="screen">  <li id="screen">
 <font color="#009000"><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>  <strong>017: INSTALLATION FIX: July 3, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The screen package shipped with 2.7 does not install itself properly.  The  The screen package shipped with 2.7 does not install itself properly.  The
 existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to  existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to
Line 336 
Line 334 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xlhash">  <li id="xlhash">
 <font color="#009000"><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>  <strong>016: DRIVER BUG: July 2, 2000</strong><br>
 The <a href="https://man.openbsd.org/OpenBSD-2.7/xl.4">xl(4)</a>  The <a href="https://man.openbsd.org/OpenBSD-2.7/xl.4">xl(4)</a>
 driver supporting various 3com cards, had a bug which prevented the multicast  driver supporting various 3com cards, had a bug which prevented the multicast
 filter from working correctly on the 3c905B, thus preventing many IPv6 things  filter from working correctly on the 3c905B, thus preventing many IPv6 things
Line 346 
Line 344 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ste">  <li id="ste">
 <font color="#009000"><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>  <strong>015: DRIVER BUG: June 30, 2000</strong><br>
 The <a href="https://man.openbsd.org/OpenBSD-2.7/ste.4">ste(4)</a>  The <a href="https://man.openbsd.org/OpenBSD-2.7/ste.4">ste(4)</a>
 driver supporting Ethernet cards based on the Sundance ST201 chipset  driver supporting Ethernet cards based on the Sundance ST201 chipset
 (i.e., the D-Link 550TX) has a bug which causes the machine to panic at  (i.e., the D-Link 550TX) has a bug which causes the machine to panic at
Line 356 
Line 354 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pcvt">  <li id="pcvt">
 <font color="#009000"><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>  <strong>014: DRIVER BUG: June 30, 2000</strong><br>
 The PC console driver (PCVT) has two bugs. Display problems can result if  The PC console driver (PCVT) has two bugs. Display problems can result if
 reverse video mode is turned on or off twice in a row. This patch also  reverse video mode is turned on or off twice in a row. This patch also
 fixes a problem with scrolling region handling that has been seen by many  fixes a problem with scrolling region handling that has been seen by many
Line 367 
Line 365 
 This is the second revision of the patch.  This is the second revision of the patch.
 <p>  <p>
 <li id="libedit">  <li id="libedit">
 <font color="#009000"><strong>013: SECURITY FIX: June 28, 2000</strong></font>  <strong>013: SECURITY FIX: June 28, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 libedit would check for a <b>.editrc</b> file in the current directory.  libedit would check for a <b>.editrc</b> file in the current directory.
 That behaviour is not nice; this does not turn into a security problem in  That behaviour is not nice; this does not turn into a security problem in
Line 377 
Line 375 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="dhclient">  <li id="dhclient">
 <font color="#009000"><strong>012: SECURITY FIX: June 24, 2000</strong></font>  <strong>012: SECURITY FIX: June 24, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A serious bug in dhclient(8) could allow strings from a malicious dhcp  A serious bug in dhclient(8) could allow strings from a malicious dhcp
 server to be executed in the shell as root.  server to be executed in the shell as root.
Line 386 
Line 384 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="if_an">  <li id="if_an">
 <font color="#009000"><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>  <strong>011: DRIVER BUG: June 17, 2000</strong><br>
 The <a href="https://man.openbsd.org/OpenBSD-2.7/an.4">an(4)</a>  The <a href="https://man.openbsd.org/OpenBSD-2.7/an.4">an(4)</a>
 Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents  Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
 <a href="https://man.openbsd.org/OpenBSD-2.7/ancontrol.8">ancontrol(8)</a> from working correctly, instead causing a panic.  <a href="https://man.openbsd.org/OpenBSD-2.7/ancontrol.8">ancontrol(8)</a> from working correctly, instead causing a panic.
Line 395 
Line 393 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="amiga_cd">  <li id="amiga_cd">
 <font color="#009000"><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>  <strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong><br>
 On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives  On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives
 files for installation, ie:  files for installation, ie:
 <pre>  <pre>
Line 418 
Line 416 
 The FTP area sets do not suffer from this problem.  The FTP area sets do not suffer from this problem.
 <p>  <p>
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>009: SECURITY FIX: June 9, 2000</strong></font>  <strong>009: SECURITY FIX: June 9, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A serious bug in isakmpd(8) policy handling wherein policy  A serious bug in isakmpd(8) policy handling wherein policy
 verification could be completely bypassed in isakmpd.  verification could be completely bypassed in isakmpd.
Line 427 
Line 425 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="msdosfs">  <li id="msdosfs">
 <font color="#009000"><strong>008: RELIABILITY FIX: June 8, 2000</strong></font>  <strong>008: RELIABILITY FIX: June 8, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Some operations in msdosfs could result in a system panic.  Some operations in msdosfs could result in a system panic.
 <br>  <br>
Line 435 
Line 433 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cd9660">  <li id="cd9660">
 <font color="#009000"><strong>007: RELIABILITY FIX: June 8, 2000</strong></font>  <strong>007: RELIABILITY FIX: June 8, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 NFS exporting of CD filesystems caused a system panic.  NFS exporting of CD filesystems caused a system panic.
 <br>  <br>
Line 443 
Line 441 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="uselogin">  <li id="uselogin">
 <font color="#009000"><strong>006: SECURITY FIX: June 6, 2000</strong></font>  <strong>006: SECURITY FIX: June 6, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not  The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not
 be used.  On other operating systems, it results in a hole.<br>  be used.  On other operating systems, it results in a hole.<br>
 Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.  Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.
 <p>  <p>
 <li id="ipopts">  <li id="ipopts">
 <font color="#009000"><strong>005: RELIABILITY FIX: May 29, 2000</strong></font>  <strong>005: RELIABILITY FIX: May 29, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Parse IPv4 options more carefully.  It is not yet clear if this can even be used  Parse IPv4 options more carefully.  It is not yet clear if this can even be used
 to crash the machine remote or locally.  to crash the machine remote or locally.
Line 459 
Line 457 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="route">  <li id="route">
 <font color="#009000"><strong>004: RELIABILITY FIX: May 29, 2000</strong></font>  <strong>004: RELIABILITY FIX: May 29, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Certain routing table modifications by the superuser could cause a system panic.  Certain routing table modifications by the superuser could cause a system panic.
 <br>  <br>
Line 467 
Line 465 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="bridge">  <li id="bridge">
 <font color="#009000"><strong>003: SECURITY FIX: May 26, 2000</strong></font>  <strong>003: SECURITY FIX: May 26, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible to bypass the <i>learning</i> flag on an interface if frames  It is possible to bypass the <i>learning</i> flag on an interface if frames
 go directly to the machine acting as a  go directly to the machine acting as a
Line 477 
Line 475 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ef">  <li id="ef">
 <font color="#009000"><strong>002: DRIVER FIX: May 26, 2000</strong></font>  <strong>002: DRIVER FIX: May 26, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The  The
 <a href="https://man.openbsd.org/OpenBSD-2.7/ef.4">ef(4)</a>  <a href="https://man.openbsd.org/OpenBSD-2.7/ef.4">ef(4)</a>
Line 487 
Line 485 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ipf">  <li id="ipf">
 <font color="#009000"><strong>001: SECURITY FIX: May 25, 2000</strong></font>  <strong>001: SECURITY FIX: May 25, 2000</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A misuse of ipf(8)  A misuse of ipf(8)
 <i>keep-state</i> rules can result in firewall rules being bypassed.<br>  <i>keep-state</i> rules can result in firewall rules being bypassed.<br>
Line 499 
Line 497 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.94  
changed lines
  Added in v.1.95