[BACK]Return to errata29.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata29.html between version 1.65 and 1.66

version 1.65, 2014/03/28 03:04:30 version 1.66, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2002 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 64 
Line 63 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_2_9</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_2_9</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#10.14">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <a name="all"></a>  <a name="all"></a>
Line 79 
Line 81 
 <li><a name="resolver"></a>  <li><a name="resolver"></a>
 <font color="#009000"><strong>027: SECURITY FIX: June 25, 2002</strong></font><br>  <font color="#009000"><strong>027: SECURITY FIX: June 25, 2002</strong></font><br>
 A potential buffer overflow in the DNS resolver has been found.<br>  A potential buffer overflow in the DNS resolver has been found.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/027_resolver.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/027_resolver.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fdalloc2"></a>  <li><a name="fdalloc2"></a>
 <font color="#009000"><strong>026: SECURITY FIX: May 8, 2002</strong></font><br>  <font color="#009000"><strong>026: SECURITY FIX: May 8, 2002</strong></font><br>
 A race condition exists where an attacker could fill the file descriptor  A race condition exists where an attacker could fill the file descriptor
 table and defeat the kernel's protection of fd slots 0, 1, and 2 for a  table and defeat the kernel's protection of fd slots 0, 1, and 2 for a
 setuid or setgid process.<br>  setuid or setgid process.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/026_fdalloc2.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/026_fdalloc2.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo2"></a>  <li><a name="sudo2"></a>
 <font color="#009000"><strong>025: SECURITY FIX: April 25, 2002</strong></font><br>  <font color="#009000"><strong>025: SECURITY FIX: April 25, 2002</strong></font><br>
 A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>  A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/025_sudo.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/025_sudo.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshafs"></a>  <li><a name="sshafs"></a>
 <font color="#009000"><strong>024: SECURITY FIX: April 22, 2002</strong></font><br>  <font color="#009000"><strong>024: SECURITY FIX: April 22, 2002</strong></font><br>
Line 101 
Line 106 
 KerberosTgtPassing or AFSTokenPassing has been enabled  KerberosTgtPassing or AFSTokenPassing has been enabled
 in the sshd_config file.  Ticket and token passing is not enabled  in the sshd_config file.  Ticket and token passing is not enabled
 by default.<br>  by default.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/024_sshafs.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/024_sshafs.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="mail"></a>  <li><a name="mail"></a>
 <font color="#009000"><strong>023: SECURITY FIX: April 11, 2002</strong></font><br>  <font color="#009000"><strong>023: SECURITY FIX: April 11, 2002</strong></font><br>
Line 109 
Line 115 
 will process tilde escapes even in non-interactive mode.  will process tilde escapes even in non-interactive mode.
 This can lead to a local root compromise.  This can lead to a local root compromise.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/023_mail.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/023_mail.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="zlib"></a>  <li><a name="zlib"></a>
 <font color="#009000"><strong>022: RELIABILITY FIX: March 13, 2002</strong></font><br>  <font color="#009000"><strong>022: RELIABILITY FIX: March 13, 2002</strong></font><br>
Line 119 
Line 126 
 function detects this.  function detects this.
 There is also a kernel zlib component that may be used by pppd and IPsec.  There is also a kernel zlib component that may be used by pppd and IPsec.
 The feasibility of attacking the kernel this way is currently unknown.<br>  The feasibility of attacking the kernel this way is currently unknown.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/022_zlib.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/022_zlib.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssh"></a>  <li><a name="openssh"></a>
 <font color="#009000"><strong>021: SECURITY FIX: March 8, 2002</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: March 8, 2002</strong></font>
 <br>  <br>
 A local user can gain super-user privileges due to an off-by-one check  A local user can gain super-user privileges due to an off-by-one check
 in the channel forwarding code of OpenSSH.<br>  in the channel forwarding code of OpenSSH.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/021_openssh.patch"  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/021_openssh.patch">
 >A source code patch exists which remedies the problem</a>.  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ptrace"></a>  <li><a name="ptrace"></a>
 <font color="#009000"><strong>020: SECURITY FIX: February 20, 2002</strong></font><br>  <font color="#009000"><strong>020: SECURITY FIX: February 20, 2002</strong></font><br>
 A race condition between the ptrace(2) and execve(2) system calls allows  A race condition between the ptrace(2) and execve(2) system calls allows
 an attacker to modify the memory contents of suid/sgid processes which  an attacker to modify the memory contents of suid/sgid processes which
 could lead to compromise of the super-user account.<br>  could lead to compromise of the super-user account.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/020_ptrace.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/020_ptrace.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo"></a>  <li><a name="sudo"></a>
 <font color="#009000"><strong>019: SECURITY FIX: January 17, 2002</strong></font><br>  <font color="#009000"><strong>019: SECURITY FIX: January 17, 2002</strong></font><br>
Line 146 
Line 155 
 ships with OpenBSD) is the mailer.  As of version 1.6.5, sudo passes  ships with OpenBSD) is the mailer.  As of version 1.6.5, sudo passes
 the mailer an environment that is not subject to influence from the  the mailer an environment that is not subject to influence from the
 invoking user.<br>  invoking user.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/019_sudo.patch">A  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/019_sudo.patch">
 source code patch exists which remedies the problem</a>.  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lpd2"></a>  <li><a name="lpd2"></a>
 <font color="#009000"><strong>017: SECURITY FIX: November 28, 2001</strong></font><br>  <font color="#009000"><strong>017: SECURITY FIX: November 28, 2001</strong></font><br>
Line 157 
Line 166 
 /etc/hosts.equiv) may be used to mount an attack and the attacker  /etc/hosts.equiv) may be used to mount an attack and the attacker
 must have root access on the machine.  OpenBSD does not start lpd  must have root access on the machine.  OpenBSD does not start lpd
 in the default installation.  in the default installation.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/017_lpd.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/017_lpd.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="vi.recover"></a>  <li><a name="vi.recover"></a>
 <font color="#009000"><strong>016: SECURITY FIX: November 13, 2001</strong></font><br>  <font color="#009000"><strong>016: SECURITY FIX: November 13, 2001</strong></font><br>
 A security issue exists in the vi.recover script that may allow an attacker  A security issue exists in the vi.recover script that may allow an attacker
 to remove arbitrary zero-length files, regardless of ownership.  to remove arbitrary zero-length files, regardless of ownership.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uucp"></a>  <li><a name="uucp"></a>
 <font color="#009000"><strong>015: SECURITY FIX: September 11, 2001</strong></font><br>  <font color="#009000"><strong>015: SECURITY FIX: September 11, 2001</strong></font><br>
Line 176 
Line 187 
 some UUCP commands are run as root (and daemon) from cron it is possible  some UUCP commands are run as root (and daemon) from cron it is possible
 to leverage compromise of the UUCP user to gain root.  to leverage compromise of the UUCP user to gain root.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/015_uucp.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/015_uucp.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lpd"></a>  <li><a name="lpd"></a>
 <font color="#009000"><strong>014: SECURITY FIX: August 29, 2001</strong></font><br>  <font color="#009000"><strong>014: SECURITY FIX: August 29, 2001</strong></font><br>
Line 187 
Line 199 
 access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv)  access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv)
 may be used to mount an attack.  may be used to mount an attack.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/014_lpd.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/014_lpd.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail2"></a>  <li><a name="sendmail2"></a>
 <font color="#009000"><strong>013: SECURITY FIX: August 21, 2001</strong></font><br>  <font color="#009000"><strong>013: SECURITY FIX: August 21, 2001</strong></font><br>
Line 195 
Line 208 
 that may allow an attacker on the local host to gain root privileges by  that may allow an attacker on the local host to gain root privileges by
 specifying out-of-bounds debug parameters.  specifying out-of-bounds debug parameters.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/013_sendmail.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/013_sendmail.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="nfs"></a>  <li><a name="nfs"></a>
 <font color="#009000"><strong>012: SECURITY FIX: July 30, 2001</strong></font><br>  <font color="#009000"><strong>012: SECURITY FIX: July 30, 2001</strong></font><br>
Line 205 
Line 219 
 privileges can initiate this attack.  In default installs, only super-user has  privileges can initiate this attack.  In default installs, only super-user has
 mount privileges.  The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;sektion=3">sysctl(3)</a> controls whether other users have mount privileges.  mount privileges.  The kern.usermount <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;sektion=3">sysctl(3)</a> controls whether other users have mount privileges.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/012_nfs.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pkg"></a>  <li><a name="pkg"></a>
 <font color="#009000"><strong>011: RELIABILITY FIX: July 15, 2001</strong></font>  <font color="#009000"><strong>011: RELIABILITY FIX: July 15, 2001</strong></font>
Line 216 
Line 231 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=packages-specs&amp;sektion=7&amp;format=html">packages-specs(7)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=packages-specs&amp;sektion=7&amp;format=html">packages-specs(7)</a>
 for details).  for details).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/011_pkg.patch">A source code patch exists which remedies the problem</a>,  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/011_pkg.patch">
   A source code patch exists which remedies this problem.</a>
 by forcing <code>/usr/sbin/pkg</code> to be more careful in checking  by forcing <code>/usr/sbin/pkg</code> to be more careful in checking
 version numbers.  version numbers.
 <p>  <p>
Line 230 
Line 246 
 and  and
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&amp;sektion=8&amp;format=html">dump(8)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=dump&amp;sektion=8&amp;format=html">dump(8)</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/008_twe.patch">
   A source code patch exists which remedies this problem.</a>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="kernexec"></a>  <li><a name="kernexec"></a>
 <font color="#009000"><strong>007: SECURITY FIX: June 15, 2001</strong></font><br>  <font color="#009000"><strong>007: SECURITY FIX: June 15, 2001</strong></font><br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.  A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/007_kernexec.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/007_kernexec.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshcookie"></a>  <li><a name="sshcookie"></a>
 <font color="#009000"><strong>006: SECURITY FIX: June 12, 2001</strong></font><br>  <font color="#009000"><strong>006: SECURITY FIX: June 12, 2001</strong></font><br>
Line 245 
Line 263 
 allows users to delete arbitrary files named "cookies" if X11  allows users to delete arbitrary files named "cookies" if X11
 forwarding is enabled. X11 forwarding is disabled by default.  forwarding is enabled. X11 forwarding is disabled by default.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/006_sshcookie.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/006_sshcookie.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pwd_mkdb"></a>  <li><a name="pwd_mkdb"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: June 7, 2001</strong></font><br>  <font color="#009000"><strong>005: RELIABILITY FIX: June 7, 2001</strong></font><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pwd_mkdb&amp;sektion=8&amp;format=html">pwd_mkdb(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pwd_mkdb&amp;sektion=8&amp;format=html">pwd_mkdb(8)</a>
 corrupts /etc/pwd.db when modifying an existing user.  corrupts /etc/pwd.db when modifying an existing user.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/005_pwd_mkdb.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/005_pwd_mkdb.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: June 5, 2001</strong></font><br>  <font color="#009000"><strong>004: RELIABILITY FIX: June 5, 2001</strong></font><br>
Line 260 
Line 280 
 will fail to use a certificate with an identity string that is  will fail to use a certificate with an identity string that is
 exactly N * 8 bytes long.  exactly N * 8 bytes long.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/004_isakmpd.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/004_isakmpd.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cd_cover"></a>  <li><a name="cd_cover"></a>
 <font color="#009000"><strong>003: DOCUMENTATION FIX: June 1, 2001</strong></font><br>  <font color="#009000"><strong>003: DOCUMENTATION FIX: June 1, 2001</strong></font><br>
Line 278 
Line 299 
 the old fts bug but happens when popping out of directories, as  the old fts bug but happens when popping out of directories, as
 opposed to descending into them.  opposed to descending into them.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/002_fts.patch">A source code patch exists which remedies the problem</a>.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/002_fts.patch">
   A source code patch exists which remedies this problem.</a>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
Line 287 
Line 309 
 context of a signal handler.  This leads to potentially serious  context of a signal handler.  This leads to potentially serious
 race conditions.  At the moment this is a theoretical attack only  race conditions.  At the moment this is a theoretical attack only
 and can only be exploited on the local host (if at all).<br>  and can only be exploited on the local host (if at all).<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/001_sendmail.patch">A source code patch exists</a> which remedies the problem by updating sendmail to version 8.11.4.  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/001_sendmail.patch">
   A source code patch exists which remedies this problem.</a>
 </ul>  </ul>
 <p>  <p>
 <a name="i386"></a>  <a name="i386"></a>
Line 299 
Line 322 
 The NVIDIA driver for XFree86 4.0.3 is incorrectly restoring the text  The NVIDIA driver for XFree86 4.0.3 is incorrectly restoring the text
 mode palette upon exit of the X server. <a  mode palette upon exit of the X server. <a
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/010_nvidia.patch">  href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/010_nvidia.patch">
 A source code patch exists</a> which remedies the problem.  A source code patch exists which remedies this problem.</a>
 To avoid rebuilding the whole XFree86 tree, an updated binary driver  To avoid rebuilding the whole XFree86 tree, an updated binary driver
 is also available  is also available
 <a  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/nv_drv.o">here</a>.
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/nv_drv.o">here  Just grab it, copy it to /usr/X11R6/lib/modules/drivers/ and
 </a>. Just grab it, copy it to /usr/X11R6/lib/modules/drivers/ and  
 restart your X server.  restart your X server.
 <p>  <p>
 <li><a name="XF86Setup"></a>  <li><a name="XF86Setup"></a>
Line 313 
Line 335 
 The XF86Setup(1) configuration tool for XFree86 3.3.6 is producing  The XF86Setup(1) configuration tool for XFree86 3.3.6 is producing
 corrupted /etc/XF86Config files.  corrupted /etc/XF86Config files.
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/009_XF86Setup.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.9/i386/009_XF86Setup.patch">
 A source code patch exists</a> which remedies the problem by linking  A source code patch exists which remedies this problem.</a>
 XF86Setup against the XFree86 3.3.6 version of libXxf86vm.a.  It does so by linking XF86Setup against the XFree86 3.3.6 version of libXxf86vm.a.
 <p>  <p>
 <li>When using a PS/2 keyboard with an MSI K7T Pro2A motherboard, it may be  <li>When using a PS/2 keyboard with an MSI K7T Pro2A motherboard, it may be
 necessary to disable the &quot;USB Keyboard Support&quot; and  necessary to disable the &quot;USB Keyboard Support&quot; and
Line 322 
Line 344 
 keyboard controller doesn't acknowledge commands, confusing OpenBSD.  keyboard controller doesn't acknowledge commands, confusing OpenBSD.
 </ul>  </ul>
 <p>  <p>
 <a name="alpha"></a>  
 <h3><font color="#e00000">alpha</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mac68k"></a>  <a name="mac68k"></a>
 <h3><font color="#e00000">mac68k</font></h3>  <h3><font color="#e00000">mac68k</font></h3>
 <ul>  <ul>
Line 349 
Line 365 
 </pre>  </pre>
 </ul>  </ul>
 <p>  <p>
 <a name="sparc"></a>  
 <h3><font color="#e00000">sparc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="amiga"></a>  
 <h3><font color="#e00000">amiga</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="pmax"></a>  
 <h3><font color="#e00000">pmax</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hp300"></a>  
 <h3><font color="#e00000">hp300</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mvme68k"></a>  
 <h3><font color="#e00000">mvme68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="powerpc"></a>  
 <h3><font color="#e00000">powerpc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="vax"></a>  
 <h3><font color="#e00000">vax</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sun3"></a>  
 <h3><font color="#e00000">sun3</font></h3>  
 <ul>  
 <li>No problems identified yet.  
   
 </ul>  </ul>
   

Legend:
Removed from v.1.65  
changed lines
  Added in v.1.66