[BACK]Return to errata28.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata28.html between version 1.69 and 1.70

version 1.69, 2014/10/02 14:34:45 version 1.70, 2015/02/14 04:36:51
Line 81 
Line 81 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="uucp"></a>  <li id="uucp">
 <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=uuxqt&amp;sektion=8">uuxqt(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=uuxqt&amp;sektion=8">uuxqt(8)</a>
Line 95 
Line 95 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/033_uucp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/033_uucp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lpd"></a>  <li id="lpd">
 <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font>  <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lpd&amp;sektion=8">lpd(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lpd&amp;sektion=8">lpd(8)</a>
Line 108 
Line 108 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/032_lpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/032_lpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail2"></a>  <li id="sendmail2">
 <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>
Line 118 
Line 118 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/031_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/031_sendmail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kernexec"></a>  <li id="kernexec">
 <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.  A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.
Line 126 
Line 126 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fts"></a>  <li id="fts">
 <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Programs using the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>  Programs using the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>
Line 139 
Line 139 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="sendmail"></a>  <li id="sendmail">
 <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The signal handlers in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sen  The signal handlers in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sen
Line 151 
Line 151 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 It updates sendmail to version 8.11.4.  It updates sendmail to version 8.11.4.
 <p>  <p>
 <li><a name="ipf_frag"></a>  <li id="ipf_frag">
 <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font>  <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>  IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="glob_limit"></a>  <li id="glob_limit">
 <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="glob"></a>  <li id="glob">
 <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="readline"></a>  <li id="readline">
 <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
Line 184 
Line 184 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipsec_ah"></a>  <li id="ipsec_ah">
 <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>  Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="userldt"></a>  <li id="userldt">
 <font color="#009000"><strong>022: SECURITY FIX: Mar 2, 2001</strong></font><br>  <font color="#009000"><strong>022: SECURITY FIX: Mar 2, 2001</strong></font><br>
 The <b>USER_LDT</b> kernel option allows an attacker to gain access to privileged areas of kernel memory. This option is not on by default.  The <b>USER_LDT</b> kernel option allows an attacker to gain access to privileged areas of kernel memory. This option is not on by default.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/022_userltd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/022_userltd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo"></a>  <li id="sudo">
 <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
Line 206 
Line 206 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/021_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="libwrap"></a>  <li id="libwrap">
 <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font>  <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>  Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lepci"></a>  <li id="lepci">
 <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font>  <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>  Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="named"></a>  <li id="named">
 <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>  Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>
Line 229 
Line 229 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/018_named.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li id="rnd">
 <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tl"></a>  <li id="tl">
 <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font>  <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Allow ThunderLAN cards to share interrupts nicely.<br>  Allow ThunderLAN cards to share interrupts nicely.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pms"></a>  <li id="pms">
 <font color="#009000"><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br>  <font color="#009000"><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br>
 Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br>  Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/015_pms.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xlock"></a>  <li id="xlock">
 <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>  Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>
Line 269 
Line 269 
 <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a>  <li><a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/mvme68k/xlock">Xlock - mvme68k</a>
 </ul>  </ul>
 <p>  <p>
 <li><a name="procfs"></a>  <li id="procfs">
 <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="imacdv"></a>  <li id="imacdv">
 <font color="#009000"><strong>012: INSTALL PROBLEM: Dec 14, 2000</strong></font><br>  <font color="#009000"><strong>012: INSTALL PROBLEM: Dec 14, 2000</strong></font><br>
 The IMac DV+ (and probably some other machines) incorrectly identify their video  The IMac DV+ (and probably some other machines) incorrectly identify their video
 hardware, but it is possible to work around the problem.<br>  hardware, but it is possible to work around the problem.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/012_imacdv.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/powerpc/012_imacdv.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="hwcrypto"></a>  <li id="hwcrypto">
 <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font>  <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The crypto subsystem could incorrectly fail to run certain software ciphers,  The crypto subsystem could incorrectly fail to run certain software ciphers,
Line 291 
Line 291 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fastroute"></a>  <li id="fastroute">
 <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A crash could occur during fast routing, if IPSEC was enabled.<br>  A crash could occur during fast routing, if IPSEC was enabled.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos2"></a>  <li id="kerberos2">
 <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Another problem exists in the Kerberos libraries.<br>  Another problem exists in the Kerberos libraries.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li id="kerberos">
 <font color="#009000"><strong>008: SECURITY FIX: Dec 7, 2000</strong></font>  <font color="#009000"><strong>008: SECURITY FIX: Dec 7, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Two problems have recently been discovered in the KerberosIV code.<p>  Two problems have recently been discovered in the KerberosIV code.<p>
Line 321 
Line 321 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/008_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/008_kerberos.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="x_sun3"></a>  <li id="x_sun3">
 <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>007: INSTALL PROBLEM: Dec 4, 2000</strong></font><br>
 The X packages  The X packages
 <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xshare28.tgz">share28.tgz</a>  <a href="http://ftp.openbsd.org/pub/OpenBSD/2.8/sun3/xshare28.tgz">share28.tgz</a>
Line 334 
Line 334 
     # cd /; tar xvfpz xfont28.tgz      # cd /; tar xvfpz xfont28.tgz
 </pre>  </pre>
 <p>  <p>
 <li><a name="pcibios"></a>  <li id="pcibios">
 <font color="#009000"><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>  <font color="#009000"><strong>006: STABILITY FIX: Dec 4, 2000</strong></font><br>
 On some machines, a PCIBIOS device driver interrupt allocation bug can cause a  On some machines, a PCIBIOS device driver interrupt allocation bug can cause a
 kernel hang while probing PCI devices.  If you have this symptom, you can disable  kernel hang while probing PCI devices.  If you have this symptom, you can disable
Line 351 
Line 351 
     permanently.      permanently.
     </ul>      </ul>
 <p>  <p>
 <li><a name="ftpd"></a>  <li id="ftpd">
 <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font>  <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>
Line 359 
Line 359 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.  You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.
 <p>  <p>
 <li><a name="rijndael"></a>  <li id="rijndael">
 <font color="#009000"><strong>004: RELIABILITY FIX: Nov 17, 2000</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: Nov 17, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 First off, AES (Rijndael) encryption and decryption were broken for IPsec  First off, AES (Rijndael) encryption and decryption were broken for IPsec
Line 369 
Line 369 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is the second revision of the patch.  This is the second revision of the patch.
 <p>  <p>
 <li><a name="qe"></a>  <li id="qe">
 <font color="#009000"><strong>003: RELIABILITY FIX: Nov 17, 2000</strong></font><br>  <font color="#009000"><strong>003: RELIABILITY FIX: Nov 17, 2000</strong></font><br>
 Configuring a qec+qe causes a NMI panic.<br>  Configuring a qec+qe causes a NMI panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/003_qe.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/sparc/003_qe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="skey"></a>  <li id="skey">
 <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font>  <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider  In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider
Line 383 
Line 383 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="zsconsole"></a>  <li id="zsconsole">
 <font color="#009000"><strong>001: RELIABILITY FIX: Nov 10, 2000</strong></font><br>  <font color="#009000"><strong>001: RELIABILITY FIX: Nov 10, 2000</strong></font><br>
 When running a sparc with a serial console, certain types of interrupts would  When running a sparc with a serial console, certain types of interrupts would
 cause great grief.<br>  cause great grief.<br>

Legend:
Removed from v.1.69  
changed lines
  Added in v.1.70