[BACK]Return to errata27.html CVS log [TXT][DIR] Up to [local] / www

File: [local] / www / errata27.html (download) (as text)

Revision 1.28, Tue Jun 18 01:44:05 2002 UTC (21 years, 11 months ago) by jsyn
Branch: MAIN
Changes since 1.27: +2 -2 lines

make the OpenBSD logo on each page a link back to index.html; from
s@smith.net, ok deraadt@

<!DOCTYPE HTML PUBLIC  "-//IETF//DTD HTML Strict//EN">
<html>
<head>
<title>OpenBSD 2.7 errata</title>
<link rev=made href=mailto:www@openbsd.org>
<meta name="resource-type" content="document">
<meta name="description" content="the OpenBSD CD errata page">
<meta name="keywords" content="openbsd,cd,errata">
<meta name="distribution" content="global">
<meta name="copyright" content="This document copyright 1997-2001 by OpenBSD.">
</head>

<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">

<a href="index.html"><img alt="[OpenBSD]" height="30" width="141" src="images/smalltitle.gif" border="0"></a>
<h2><font color=#0000e0>
This is the OpenBSD 2.7 release errata &amp; patch list:

</font></h2>

<hr>
<a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br>
<a href=errata28.html>For 2.8 errata, please refer here</a>.<br>
<a href=errata29.html>For 2.9 errata, please refer here</a>.<br>
<a href=errata30.html>For 3.0 errata, please refer here</a>.<br>
<a href=errata.html>For 3.1 errata, please refer here</a>.<br>
<hr>

<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7.tar.gz>
You can also fetch a tar.gz file containing all the following patches</a>.
This file is updated once a day.

<p> The patches below are available in CVS via the
<code>OPENBSD_2_7</code> <a href="stable.html">patch branch</a>.

<p>
For more detailed information on install patches to OpenBSD, please
consult the <a href="./faq/faq10.html#10.14">OpenBSD FAQ</a>.
<hr>

<dl>
<a name=all></a>
<li><h3><font color=#e00000>All architectures</font></h3>
<ul>
<a name=readline></a>
<li><font color=#009000><strong>040: SECURITY FIX: Mar 18, 2001</strong></font><br>
The readline library shipped with OpenBSD allows history files creation
with a permissive
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&sektion=2">umask(2)</a>.
This can lead to the leakage of sensitive information in applications
that use passwords and the like during user interaction (one such
application is mysql).  Additionally, if the HOME environment variable
is not set, the current working directory is used; this patch disables
the history file if HOME is not set.<br>
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/040_readline.patch
">A source code patch exists which remedies the problem.</a><br>
<p>
<a name=sudo></a>
<li><font color=#009000><strong>039: SECURITY FIX: Feb 22, 2001</strong></font><br>
There is an exploitable heap corruption bug in
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&sektion=8">sudo</a>.
<br>
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/038_named.patch">A source code patch exists which remedies the problem.</a><br>
<p>
<a name=ftpd></a>
<li><font color=#009000><strong>037: SECURITY FIX: Dec 4, 2000</strong></font><br>
OpenBSD 2.7's ftpd contains a one-byte overflow in the replydirname() function.<br>
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/037_ftpd.patch">
A source code patch exists which remedies the problem.</a>
<p>
<a name=sshforwarding> </a>
<li><font color=#009000><strong>035: SECURITY FIX: Nov 10, 2000</strong></font><br>
Hostile servers can force OpenSSH clients to do agent or X11 forwarding.
This problem is fixed as of OpenSSH 2.3.0.<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/035_sshforwarding.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=execsubr> </a>
<li><font color=#009000><strong>033: RELIABILITY FIX: Nov 6, 2000</strong></font><br>
Invalid fields in the exec header could cause a crash.<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/033_execsubr.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=xtrans> </a>
<li><font color=#009000><strong>032: SECURITY FIX: Oct 26, 2000</strong></font><br>
There are two possibly exploitable potential buffer overflows in the X11
libraries using the xtrans code. One of these vulnerabilities was
reported to the 
<a href="http://www.securityfocus.com/archive/1/139436">BUGTRAQ</a>
mailing list. 
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/032_xtrans.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=httpd></a>
<li><font color=#009000><strong>031: SECURITY FIX: Oct 18, 2000</strong></font><br>
Apache has several bugs in <tt>mod_rewrite</tt> and <tt>mod_vhost_alias</tt> 
that could cause arbitrary files accessible to the www user on the server 
to be exposed under certain configurations when these modules are used.
(These modules are not active by default).
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/031_httpd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=telnetd></a>
<li><font color=#009000><strong>030: SECURITY FIX: Oct 10, 2000</strong></font><br>
The telnet daemon does not strip out the TERMINFO, TERMINFO_DIRS, TERMPATH
and TERMCAP (when it starts with a '/') environment variables.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/030_telnetd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=sendmail></a>
<li><font color=#009000><strong>029: RELIABILITY FIX: Oct 9, 2000</strong></font><br>
There is a non-exploitable buffer overflow in sendmail's test mode.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/029_sendmail.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=format_strings></a>
<li><font color=#009000><strong>028: SECURITY FIX: Oct 6, 2000</strong></font><br>
There are printf-style format string bugs in several privileged programs.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=curses></a>
<li><font color=#009000><strong>027: SECURITY FIX: Oct 6, 2000</strong></font><br>
libcurses honored terminal descriptions in the $HOME/.terminfo directory
as well as in the TERMCAP environment variable for setuid and setgid
applications.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/027_curses.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=talkd></a>
<li><font color=#009000><strong>026: SECURITY FIX: Oct 6, 2000</strong></font><br>
A format string vulnerability exists in talkd(8).  It is not clear
yet what the impact is.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/026_talkd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=pw_error></a>
<li><font color=#009000><strong>025: SECURITY FIX: Oct 3, 2000</strong></font><br>
A format string vulnerability exists in the pw_error(3) function.  This
manifests itself as a security hole in the chpass utility.  As a workaround
which disables its functionality, do
<pre>
# chmod u-s /usr/bin/chpass
</pre>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/025_pw_error.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipsec></a>
<li><font color=#009000><strong>024: SECURITY FIX: Sep 18, 2000</strong></font><br>
Bad ESP/AH packets could cause a crash under certain conditions.
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/024_ipsec.patch><br>
A source code patch exists which remedies this problem.</a>
<p>
<a name=xlock></a>
<li><font color=#009000><strong>023: SECURITY FIX: Aug 16, 2000</strong></font><br>
A format string vulnerability exists in xlock. As a workaround which disables
its functionality, do
<pre>
# chmod u-s /usr/X11R6/bin/xlock
</pre>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/023_xlock.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=X11_libs></a>
<li><font color=#009000><strong>021: SECURITY FIX: July 14, 2000</strong></font><br>
Various problems in X11 libraries have various side effects.  We provide a
jumbo patch to fix them.<p>
<ul>
    <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-15&msg=Pine.LNX.4.21.0005181947210.17658-100000@ferret.lmh.ox.ac.uk">
    Nasty X Server Dos</a><br>
    This is fixed by the patch to <b>xc/programs/Xsever/os/secauth.c</b>.
    <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192251480.9945-100000@ferret.lmh.ox.ac.uk">
    Various nasty libX11 holes</a><br>
    This is covered by the patches to <b>xc/lib/X11</b>.
    <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=Pine.LNX.4.21.0006192220220.9945-100000@ferret.lmh.ox.ac.uk">
    libICE DoS</a><br>
    This is covered by the patches to <b>xc/lib/ICE</b>.
    <li><a href="http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=Pine.LNX.4.10.10004161835150.863-100000@localhost">
    Server overflow</a><br>
    This is covered by the patches to <b>xc/programs/Xserver/xkb</b>.
    <br>
    Note that the default OpenBSD install is not vulnerable to this, since the
    the XFree86 Xwrapper already has tests for bad arguments.
</ul>
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/021_X11_libs.patch>
A source code patch exists which remedies these problems.</a><br>
<strong>Note 1:</strong> tcl/tk is required to build X11 from source.<br>
<strong>Note 2:</strong> When re-building use the command
`make DESTDIR=/ build' or you will get an error in the last
step of the build (makewhatis).  If you forget to set DESTDIR you can
ignore the build error.   The whatis database will be rebuilt the next
time /etc/weekly runs.
<p>
<a name=ftpd></a>
<li><font color=#009000><strong>019: SECURITY FIX: July 5, 2000</strong></font><br>
Just like pretty much all the other unix ftp daemons on the planet, 
ftpd had a remote root hole in it.  Luckily, ftpd was not enabled by default.
The problem exists if anonymous ftp is enabled.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/019_ftpd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=mopd></a>
<li><font color=#009000><strong>018: SECURITY FIX: July 5, 2000</strong></font><br>
Mopd contained a buffer overflow.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/018_mopd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=screen></a>
<li><font color=#009000><strong>017: INSTALLATION FIX: July 3, 2000</strong></font>
<br>
The screen package shipped with 2.7 does not install itself properly.  The 
existing package in 2.7/packages/_ARCH_/screen-3.9.5.tgz has been renamed to 
screen-3.9.5.tgz.old and a replacement package has been provided under the 
name screen-3.9.5p1.tgz.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/ports/017_screen.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=libedit></a>
<li><font color=#009000><strong>013: SECURITY FIX: June 28, 2000</strong></font><br>
libedit would check for a <b>.editrc</b> file in the current directory.
That behaviour is not nice; this does not turn into a security problem in
any real world situation that we know of, but a patch is available anyways.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/013_libedit.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=dhclient></a>
<li><font color=#009000><strong>012: SECURITY FIX: June 24, 2000</strong></font><br>
A serious bug in dhclient(8) could allow strings from a malicious dhcp
server to be executed in the shell as root.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/012_dhclient.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=isakmpd></a>
<li><font color=#009000><strong>009: SECURITY FIX: June 9, 2000</strong></font><br>
A serious bug in isakmpd(8) policy handling wherein policy
verification could be completely bypassed in isakmpd.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/009_isakmpd.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=msdosfs></a>
<li><font color=#009000><strong>008: RELIABILITY FIX: June 8, 2000</strong></font><br>
Some operations in msdosfs could result in a system panic.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/008_msdosfs.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=cd9660></a>
<li><font color=#009000><strong>007: RELIABILITY FIX: June 8, 2000</strong></font><br>
NFS exporting of CD filesystems caused a system panic.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/007_cd9660.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=uselogin></a>
<li><font color=#009000><strong>006: SECURITY FIX: June 6, 2000</strong></font><br>
The non-default UseLogin feature in <b>/etc/sshd_config</b> is broken and should not
be used.  On other operating systems, it results in a hole.<br>
Avoid use of this feature, or update to OpenSSH 2.1.1 or later if you must use it.
<p>
<a name=ipopts></a>
<li><font color=#009000><strong>005: RELIABILITY FIX: May 29, 2000</strong></font><br>
Parse IPv4 options more carefully.  It is not yet clear if this can even be used
to crash the machine remote or locally.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/005_ipopts.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=route></a>
<li><font color=#009000><strong>004: RELIABILITY FIX: May 29, 2000</strong></font><br>
Certain routing table modifications by the superuser could cause a system panic.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/004_route.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=bridge></a>
<li><font color=#009000><strong>003: SECURITY FIX: May 26, 2000</strong></font><br>
It is possible to bypass the <i>learning</i> flag on an interface if frames
go directly to the machine acting as a
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&sektion=4">bridge</a>.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/003_bridge.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ef></a>
<li><font color=#009000><strong>002: DRIVER FIX: May 26, 2000</strong></font><br>
The
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ef&sektion=4">ef(4)</a>
driver will complain when adding an address with ifconfig
(ifconfig: SIOCAIFADDR: Invalid argument).<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/002_ef.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ipf></a>
<li><font color=#009000><strong>001: SECURITY FIX: May 25, 2000</strong></font><br>
A misuse of ipf(8)
<i>keep-state</i> rules can result in firewall rules being bypassed.<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/001_ipf.patch>
A source code patch exists</a>, which remedies this problem, and updates ipf
to version 3.3.16.
<p>
</ul>
<p>
<a name=i386></a>
<li><h3><font color=#e00000>i386</font></h3>
<ul>
<a name=xlhash></a>
<li><font color=#009000><strong>016: DRIVER BUG: July 2, 2000</strong></font><br>
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xl&sektion=4">xl(4)</a>
driver supporting various 3com cards, had a bug which prevented the multicast
filter from working correctly on the 3c905B, thus preventing many IPv6 things
from working.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/016_xlhash.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=ste></a>
<li><font color=#009000><strong>015: DRIVER BUG: June 30, 2000</strong></font><br>
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ste&sektion=4">ste(4)</a>
driver supporting Ethernet cards based on the Sundance ST201 chipset
(i.e., the D-Link 550TX) has a bug which causes the machine to panic at
boot-time.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/015_ste.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=pcvt></a>
<li><font color=#009000><strong>014: DRIVER BUG: June 30, 2000</strong></font><br>
The PC console driver (PCVT) has two bugs. Display problems can result if
reverse video mode is turned on or off twice in a row. This patch also
fixes a problem with scrolling region handling that has been seen by many
users trying to use the BitchX irc client with the screen program.<br>
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/014_pcvt.patch>
There is now a second revision of the source code patch which remedies this problem.</a>
<p>
<a name=if_an></a>
<li><font color=#009000><strong>011: DRIVER BUG: June 17, 2000</strong></font><br>
The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=an&sektion=4">an(4)</a>
Aironet Communications 4500/4800 IEEE 802.11DS driver has a bug which prevents
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ancontrol&sektion=8">ancontrol(8)</a> from working correctly, instead causing a panic.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/i386/011_an.patch>
A source code patch exists which remedies this problem.</a>
<p>
</ul>
<p>
<a name=mac68k></a>
<li><h3><font color=#e00000>mac68k</font></h3>
<ul>
<a name=mac68k_arandom></a>
<li><font color=#009000><strong>022: INSTALLATION FIX: July 14, 2000</strong></font>
<br>
The MacOS installer shipped with OpenBSD 2.7 does not correctly make all
devices, specifically it does not make the <tt>/dev/arandom</tt> device
needed for the userland crypto such as ssh to work.  The problem shows itself
when ssh-keygen fails to make RSA or DSA keys, resulting in messages like
<b>RSA-generate_keys failed</b> or <b>DSA-generate_keys failed</b>.
<br>
To work around this, once your machine is up and running run the following
commands as root:
<tt><pre>
# cd /dev
# ./MAKEDEV arandom
</pre></tt>
<p>
After doing this (and possibly installing one of the ssl27 packages),
reboot your machine and it will generate ssh keys correctly.
</ul>
<p>
<a name=sparc></a>
<li><h3><font color=#e00000>sparc</font></h3>
<ul>
<a name=qe> </a>
<li><font color=#009000><strong>036: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
Configuring a qec+qe causes a NMI panic.<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/036_qe.patch>
A source code patch exists which remedies this problem.</a>
<p>
<a name=zsconsole> </a>
<li><font color=#009000><strong>034: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
When running a sparc with a serial console, certain types of interrupts would
cause great grief.<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/sparc/034_zsconsole.patch>
A source code patch exists which remedies this problem.</a>
<p>
</ul>
<p>
<a name=amiga></a>
<li><h3><font color=#e00000>amiga</font></h3>
<ul>
<a name=amiga_cd></a>
<li><font color=#009000><strong>010: CD DISTRIBUTION ERROR: June 15, 2000</strong></font><br>
On the 2.7 CD media, the <b>amiga</b> distribution contains two pairs of archives
files for installation, ie:
<pre>
-rw-r--r--  1 root  mirftp  20191465 Apr 29 14:27 base27.tar.gz
-rw-r--r--  1 root  mirftp  20291753 May 13 19:33 base27.tgz
-rw-r--r--  1 root  mirftp  13699507 Apr 29 14:26 comp27.tar.gz
-rw-r--r--  1 root  mirftp  13748096 May 13 19:33 comp27.tgz
-rw-r--r--  1 root  mirftp   1005376 Apr 29 14:26 etc27.tar.gz
-rw-r--r--  1 root  mirftp   1010772 May 13 19:33 etc27.tgz
-rw-r--r--  1 root  mirftp   2755567 Apr 29 14:26 game27.tar.gz
-rw-r--r--  1 root  mirftp   2755624 May 13 19:33 game27.tgz
-rw-r--r--  1 root  mirftp   5002872 Apr 29 14:26 man27.tar.gz
-rw-r--r--  1 root  mirftp   5038896 May 13 19:33 man27.tgz
-rw-r--r--  1 root  mirftp   1684356 Apr 29 14:26 misc27.tar.gz
-rw-r--r--  1 root  mirftp   1684381 May 13 19:33 misc27.tgz
</pre>
The installation script will list ALL of these files.  For proper
operation one should install the <b>*.tgz</b> versions, and deselect
the <b>*.tar.gz</b> versions.<br>
The FTP area sets do not suffer from this problem.
<p>
</ul>
<p>
<a name=pmax></a>
<li><h3><font color=#e00000>pmax</font></h3>
<ul>
<a name=pmax_msgbuf></a>
<li><font color=#009000><strong>020: KERNEL BUG: July 10, 2000</strong></font><br>
As originally shipped, the pmax port would fail to install due to
<b>/kern/msgbuf</b> bugs.<br>
The necessary fixes have been merged,
and the binaries needed re-released on the FTP site.<br>
However, the 2.7 <b>srcsys.tar.gz</b> file has not been updated.<br>
If you recompile a kernel, you should use either the
<a href=stable.html>stable release source tree</a> or apply the
provided patch to a 2.7 source tree.
<br>
<a href=ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/pmax/020_pmax_msgbuf.patch>
A source code patch exists which remedies this problem.</a>
<p>
</ul>
<p>
<a name=arc></a>
<li><h3><font color=#e00000>arc</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=alpha></a>
<li><h3><font color=#e00000>alpha</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=hp300></a>
<li><h3><font color=#e00000>hp300</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=mvme68k></a>
<li><h3><font color=#e00000>mvme68k</font></h3>
<ul>
<li>No problems identified yet.
</ul>
<p>
<a name=powerpc></a>
<li><h3><font color=#e00000>powerpc</font></h3>
<ul>
<li>No problems identified yet.
</ul>

</dl>
<br>

<hr>
<a href=stable.html>For OpenBSD patch branch information, please refer here.</a><br>
<a href=errata21.html>For 2.1 errata, please refer here</a>.<br>
<a href=errata22.html>For 2.2 errata, please refer here</a>.<br>
<a href=errata23.html>For 2.3 errata, please refer here</a>.<br>
<a href=errata24.html>For 2.4 errata, please refer here</a>.<br>
<a href=errata25.html>For 2.5 errata, please refer here</a>.<br>
<a href=errata26.html>For 2.6 errata, please refer here</a>.<br>
<a href=errata28.html>For 2.8 errata, please refer here</a>.<br>
<a href=errata29.html>For 2.9 errata, please refer here</a>.<br>
<a href=errata30.html>For 3.0 errata, please refer here</a>.<br>
<a href=errata.html>For 3.1 errata, please refer here</a>.<br>
<hr>

<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> 
<a href=mailto:www@openbsd.org>www@openbsd.org</a>
<br><small>$OpenBSD: errata27.html,v 1.28 2002/06/18 01:44:05 jsyn Exp $</small>

</body>
</html>