[BACK]Return to errata28.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata28.html between version 1.51 and 1.52

version 1.51, 2010/03/08 21:53:37 version 1.52, 2010/07/08 19:00:07
Line 53 
Line 53 
 <br>  <br>
 <hr>  <hr>
   
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   
Line 78 
Line 78 
 some UUCP commands are run as root (and daemon) from cron it is possible  some UUCP commands are run as root (and daemon) from cron it is possible
 to leverage compromise of the UUCP user to gain root.  to leverage compromise of the UUCP user to gain root.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/033_uucp.patch">A source code patch exists which remedies the problem</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/033_uucp.patch">A source code patch exists which remedies the problem</a>
 <p>  <p>
 <li><a name="lpd"></a>  <li><a name="lpd"></a>
 <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font><br>  <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font><br>
Line 89 
Line 89 
 access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv)  access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv)
 may be used to mount an attack.  may be used to mount an attack.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/032_lpd.patch">A source code patch exists which remedies the problem</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/032_lpd.patch">A source code patch exists which remedies the problem</a>
 <p>  <p>
 <li><a name="sendmail2"></a>  <li><a name="sendmail2"></a>
 <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font><br>  <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font><br>
Line 97 
Line 97 
 that may allow an attacker on the local host to gain root privileges by  that may allow an attacker on the local host to gain root privileges by
 specifying out-of-bounds debug parameters.  specifying out-of-bounds debug parameters.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/031_sendmail.patch">A source code patch exists which remedies the problem</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/031_sendmail.patch">A source code patch exists which remedies the problem</a>
 <p>  <p>
 <li><a name="kernexec"></a>  <li><a name="kernexec"></a>
 <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>
 <br>  <br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.  A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">A source code patch exists which remedies the problem</a>.
 <p>  <p>
 <li><a name="fts"></a>  <li><a name="fts"></a>
 <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font><br>  <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font><br>
Line 114 
Line 114 
 parent dir is changed out from underneath it.  This is similar to  parent dir is changed out from underneath it.  This is similar to
 the old fts bug but happens when popping out of directories, as  the old fts bug but happens when popping out of directories, as
 opposed to descending into them.  opposed to descending into them.
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/029_fts.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/029_fts.patch">A source code patch exists which remedies the problem</a>.
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
Line 124 
Line 124 
 context of a signal handler.  This leads to potentially serious  context of a signal handler.  This leads to potentially serious
 race conditions.  At the moment this is a theoretical attack only  race conditions.  At the moment this is a theoretical attack only
 and can only be exploited on the local host (if at all).<br>  and can only be exploited on the local host (if at all).<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/028_sendmail.patch">A source code patch exists</a> which remedies the problem by updating sendmail to version 8.11.4.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/028_sendmail.patch">A source code patch exists</a> which remedies the problem by updating sendmail to version 8.11.4.
 <p>  <p>
 <li><a name="ipf_frag"></a>  <li><a name="ipf_frag"></a>
 <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font><br>  <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font><br>
 IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>  IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="glob_limit"></a>  <li><a name="glob_limit"></a>
 <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font><br>  <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="glob"></a>  <li><a name="glob"></a>
 <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font><br>  <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="readline"></a>  <li><a name="readline"></a>
 <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font><br>  <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font><br>
Line 149 
Line 149 
 This can lead to the leakage of sensitive information in applications  This can lead to the leakage of sensitive information in applications
 that use passwords and the like during user interaction (one such  that use passwords and the like during user interaction (one such
 application is mysql).<br>  application is mysql).<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="ipsec_ah"></a>  <li><a name="ipsec_ah"></a>
 <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br>  <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br>
 Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>  Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="sudo"></a>  <li><a name="sudo"></a>
 <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br>  <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="libwrap"></a>  <li><a name="libwrap"></a>
 <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br>  <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font><br>
 Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>  Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="lepci"></a>  <li><a name="lepci"></a>
 <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font><br>  <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font><br>
 Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>  Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="named"></a>  <li><a name="named"></a>
 <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font><br>  <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font><br>
 Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>  Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>
 with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears  with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears
 that these were already impossible to exploit beforehand).<br>  that these were already impossible to exploit beforehand).<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="rnd"></a>  <li><a name="rnd"></a>
 <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font><br>  <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="tl"></a>  <li><a name="tl"></a>
 <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font><br>  <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font><br>
 Allow ThunderLAN cards to share interrupts nicely.<br>  Allow ThunderLAN cards to share interrupts nicely.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">A source code patch exists which remedies the problem.</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="xlock"></a>  <li><a name="xlock"></a>
 <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font><br>  <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font><br>
 Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>  Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">A source code patch exists which remedies the problem.</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">A source code patch exists which remedies the problem.</a>
 <p>  <p>
 In addition to a source code patch, new xlock binaries have been created for each architecture listed below. Place these binaries at <i>/usr/X11R6/bin/xlock</i>  In addition to a source code patch, new xlock binaries have been created for each architecture listed below. Place these binaries at <i>/usr/X11R6/bin/xlock</i>
  and <i>chmod 4755 /usr/X11R6/bin/xlock</i>.   and <i>chmod 4755 /usr/X11R6/bin/xlock</i>.
 <p>  <p>
 <ul>  <ul>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/xlock">Xlock - i386</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/xlock">Xlock - i386</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/xlock">Xlock - sparc</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/xlock">Xlock - sparc</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mac68k/xlock">Xlock - mac68k</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mac68k/xlock">Xlock - mac68k</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/xlock">Xlock - powerpc</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/xlock">Xlock - powerpc</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/amiga/xlock">Xlock - amiga</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/amiga/xlock">Xlock - amiga</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/hp300/xlock">Xlock - hp300</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/hp300/xlock">Xlock - hp300</a>
 <li><a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a>
 </ul>  </ul>
 <p>  <p>
 <li><a name="procfs"></a>  <li><a name="procfs"></a>
 <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br>  <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">A source code patch exists which remedies the problem.</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="hwcrypto"></a>  <li><a name="hwcrypto"></a>
 <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font><br>  <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font><br>
 The crypto subsystem could incorrectly fail to run certain software ciphers,  The crypto subsystem could incorrectly fail to run certain software ciphers,
 if a hardware card existed in the machine.<br>  if a hardware card existed in the machine.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="fastroute"></a>  <li><a name="fastroute"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font><br>  <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font><br>
 A crash could occur during fast routing, if IPSEC was enabled.<br>  A crash could occur during fast routing, if IPSEC was enabled.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="kerberos2"></a>  <li><a name="kerberos2"></a>
 <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font><br>  <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font><br>
 Another problem exists in the Kerberos libraries.<br>  Another problem exists in the Kerberos libraries.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li><a name="kerberos"></a>
Line 244 
Line 244 
 ones that have special meaning on the server. It is not clear at this  ones that have special meaning on the server. It is not clear at this
 time what the impact is, but we recommend everyone to upgrade their  time what the impact is, but we recommend everyone to upgrade their
 machines immediately.<p>  machines immediately.<p>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/008_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/008_kerberos.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="ftpd"></a>  <li><a name="ftpd"></a>
 <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font><br>
 OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/005_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/005_ftpd.patch">
 A source code patch exists which remedies the problem.</a><br>  A source code patch exists which remedies the problem.</a><br>
 You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.  You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.
 <p>  <p>
Line 259 
Line 259 
 First off, AES (Rijndael) encryption and decryption were broken for IPsec  First off, AES (Rijndael) encryption and decryption were broken for IPsec
 and swap encryption.<br>  and swap encryption.<br>
 Secondly, the AES code did not work properly on big endian machines.<br>  Secondly, the AES code did not work properly on big endian machines.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/004_rijndael.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/004_rijndael.patch">
 A second revision source code patch exists which remedies the problem.</a>  A second revision source code patch exists which remedies the problem.</a>
 <p>  <p>
 <li><a name="skey"></a>  <li><a name="skey"></a>
 <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font><br>
 In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider  In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider
 that kind of important.<br>  that kind of important.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 </ul>  </ul>
 <p>  <p>
Line 276 
Line 276 
 <li><a name="userldt"></a>  <li><a name="userldt"></a>
 <font color="#009000"><strong>022: SECURITY FIX: Mar 2, 2001</strong></font><br>  <font color="#009000"><strong>022: SECURITY FIX: Mar 2, 2001</strong></font><br>
 The <b>USER_LDT</b> kernel option allows an attacker to gain access to privileged areas of kernel memory. This option is not on by default.  The <b>USER_LDT</b> kernel option allows an attacker to gain access to privileged areas of kernel memory. This option is not on by default.
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/022_userltd.patch">A source code patch exists which remedies the problem.</a><br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/022_userltd.patch">A source code patch exists which remedies the problem.</a><br>
 <p>  <p>
 <li><a name="pms"></a>  <li><a name="pms"></a>
 <font color="#009000"><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br>  <font color="#009000"><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br>
 Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br>  Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">A source code patch exists which remedies this problem.</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pcibios"></a>  <li><a name="pcibios"></a>
 <font color="#009000"><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>
Line 308 
Line 308 
 <li><a name="x_mac68k"></a>  <li><a name="x_mac68k"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/mac68k/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/mac68k/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/mac68k/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/mac68k/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following commands:  added post-install by using the following commands:
 <pre>  <pre>
Line 325 
Line 325 
 <li><a name="x_sparc"></a>  <li><a name="x_sparc"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/sparc/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sparc/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/sparc/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sparc/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following commands:  added post-install by using the following commands:
 <pre>  <pre>
Line 338 
Line 338 
 <li><a name="qe"></a>  <li><a name="qe"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <font color="#009000"><strong>003: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/003_qe.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/003_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="zsconsole"></a>  <li><a name="zsconsole"></a>
 <font color="#009000"><strong>001: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>001: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/001_zsconsole.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/001_zsconsole.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 </ul>  </ul>
 <p>  <p>
Line 355 
Line 355 
 <li><a name="x_amiga"></a>  <li><a name="x_amiga"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/amiga/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/amiga/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/amiga/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/amiga/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following commands:  added post-install by using the following commands:
 <pre>  <pre>
Line 378 
Line 378 
 <li><a name="x_hp300"></a>  <li><a name="x_hp300"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/hp300/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/hp300/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/hp300/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/hp300/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following commands:  added post-install by using the following commands:
 <pre>  <pre>
Line 395 
Line 395 
 <li><a name="x_mvme68k"></a>  <li><a name="x_mvme68k"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/mvme68k/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/mvme68k/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/mvme68k/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/mvme68k/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following command:  added post-install by using the following command:
 <pre>  <pre>
Line 413 
Line 413 
 <font color="#009000"><strong>012: INSTALL PROBLEM: Dec 14, 2000</strong></font><br>  <font color="#009000"><strong>012: INSTALL PROBLEM: Dec 14, 2000</strong></font><br>
 The IMac DV+ (and probably some other machines) incorrectly identify their video  The IMac DV+ (and probably some other machines) incorrectly identify their video
 hardware, but it is possible to work around the problem.<br>  hardware, but it is possible to work around the problem.<br>
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/012_imacdv.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/012_imacdv.patch">
 A source code patch exists which remedies the problem.</a>  A source code patch exists which remedies the problem.</a>
 </ul>  </ul>
 <p>  <p>
Line 429 
Line 429 
 <li><a name="x_sun3"></a>  <li><a name="x_sun3"></a>
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xshare28.tgz">share28.tgz</a>
 and  and
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xfont28.tgz">font28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xfont28.tgz">font28.tgz</a>
 were not on the CD, and only available via FTP install.  These packages can be  were not on the CD, and only available via FTP install.  These packages can be
 added post-install by using the following command:  added post-install by using the following command:
 <pre>  <pre>

Legend:
Removed from v.1.51  
changed lines
  Added in v.1.52