[BACK]Return to errata30.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata30.html between version 1.80 and 1.81

version 1.80, 2014/10/02 14:34:45 version 1.81, 2015/02/14 04:36:51
Line 82 
Line 82 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="named"></a>  <li id="named">
 <font color="#009000"><strong>036: SECURITY FIX: November 14, 2002</strong></font>  <font color="#009000"><strong>036: SECURITY FIX: November 14, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow in  A buffer overflow in
Line 93 
Line 93 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/036_named.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/036_named.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kernresource"></a>  <li id="kernresource">
 <font color="#009000"><strong>035: SECURITY FIX: November 6, 2002</strong></font>  <font color="#009000"><strong>035: SECURITY FIX: November 6, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect argument checking in the  Incorrect argument checking in the
Line 102 
Line 102 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/035_kernresource.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/035_kernresource.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="smrsh"></a>  <li id="smrsh">
 <font color="#009000"><strong>034: SECURITY FIX: November 6, 2002</strong></font>  <font color="#009000"><strong>034: SECURITY FIX: November 6, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An attacker can bypass the restrictions imposed by sendmail's restricted shell,  An attacker can bypass the restrictions imposed by sendmail's restricted shell,
Line 111 
Line 111 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/034_smrsh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/034_smrsh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kadmin"></a>  <li id="kadmin">
 <font color="#009000"><strong>033: SECURITY FIX: October 21, 2002</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: October 21, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the  A buffer overflow can occur in the
Line 120 
Line 120 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/033_kadmin.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/033_kadmin.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerntime"></a>  <li id="kerntime">
 <font color="#009000"><strong>032: SECURITY FIX: October 7, 2002</strong></font>  <font color="#009000"><strong>032: SECURITY FIX: October 7, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Incorrect argument checking in the  Incorrect argument checking in the
Line 128 
Line 128 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/032_kerntime.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/032_kerntime.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="scarg"></a>  <li id="scarg">
 <font color="#009000"><strong>031: SECURITY FIX: August 11, 2002</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: August 11, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An insufficient boundary check in the  An insufficient boundary check in the
Line 138 
Line 138 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/031_scarg.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/031_scarg.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ssl"></a>  <li id="ssl">
 <font color="#009000"><strong>030: SECURITY FIX: July 30, 2002</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: July 30, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the  Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the
Line 151 
Line 151 
 <br>  <br>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="xdr"></a>  <li id="xdr">
 <font color="#009000"><strong>029: SECURITY FIX: July 29, 2002</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: July 29, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the  A buffer overflow can occur in the
Line 162 
Line 162 
 <br>  <br>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="pppd"></a>  <li id="pppd">
 <font color="#009000"><strong>028: SECURITY FIX: July 29, 2002</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: July 29, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists in the  A race condition exists in the
Line 171 
Line 171 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/028_pppd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/028_pppd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd2"></a>  <li id="isakmpd2">
 <font color="#009000"><strong>027: RELIABILITY FIX: July 5, 2002</strong></font>  <font color="#009000"><strong>027: RELIABILITY FIX: July 5, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Receiving IKE payloads out of sequence can cause  Receiving IKE payloads out of sequence can cause
Line 181 
Line 181 
 <br>  <br>
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="ktrace"></a>  <li id="ktrace">
 <font color="#009000"><strong>026: SECURITY FIX: June 27, 2002</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: June 27, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The kernel would let any user <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ktrace&amp;sektion=2">ktrace(2)</a> set[ug]id processes.<br>  The kernel would let any user <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ktrace&amp;sektion=2">ktrace(2)</a> set[ug]id processes.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/026_ktrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/026_ktrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="resolver"></a>  <li id="resolver">
 <font color="#009000"><strong>025: SECURITY FIX: June 25, 2002</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: June 25, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A potential buffer overflow in the DNS resolver has been found.<br>  A potential buffer overflow in the DNS resolver has been found.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/025_resolver.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/025_resolver.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshdauth"></a>  <li id="sshdauth">
 <font color="#009000"><strong>024: SECURITY FIX: June 24, 2002</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: June 24, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation  All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation
Line 204 
Line 204 
 3.4</a>, and a patch for the vulnerable releases is available as part of the  3.4</a>, and a patch for the vulnerable releases is available as part of the
 <a href="http://www.openssh.com/txt/preauth.adv">security advisory</a>.  <a href="http://www.openssh.com/txt/preauth.adv">security advisory</a>.
 <p>  <p>
 <li><a name="modssl"></a>  <li id="modssl">
 <font color="#009000"><strong>023: SECURITY FIX: June 24, 2002</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: June 24, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd  A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd
Line 212 
Line 212 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/023_mod_ssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/023_mod_ssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>022: SECURITY FIX: June 19, 2002</strong></font>  <font color="#009000"><strong>022: SECURITY FIX: June 19, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A buffer overflow can occur during the interpretation of chunked  A buffer overflow can occur during the interpretation of chunked
Line 220 
Line 220 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/022_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/022_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fdalloc2"></a>  <li id="fdalloc2">
 <font color="#009000"><strong>021: SECURITY FIX: May 8, 2002</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: May 8, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition exists where an attacker could fill the file descriptor  A race condition exists where an attacker could fill the file descriptor
Line 229 
Line 229 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/021_fdalloc2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/021_fdalloc2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo2"></a>  <li id="sudo2">
 <font color="#009000"><strong>020: SECURITY FIX: April 25, 2002</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: April 25, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>  A bug in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo(8)</a> may allow an attacker to corrupt the heap by specifying a custom prompt.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/020_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/020_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshafs"></a>  <li id="sshafs">
 <font color="#009000"><strong>019: SECURITY FIX: April 22, 2002</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: April 22, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A local user can gain super-user privileges due to a buffer overflow  A local user can gain super-user privileges due to a buffer overflow
Line 248 
Line 248 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/019_sshafs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/019_sshafs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="mail"></a>  <li id="mail">
 <font color="#009000"><strong>018: SECURITY FIX: April 11, 2002</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: April 11, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mail&amp;sektion=1">mail(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mail&amp;sektion=1">mail(1)</a>
Line 258 
Line 258 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/018_mail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/018_mail.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>017: RELIABILITY FIX: March 26, 2002</strong></font>  <font color="#009000"><strong>017: RELIABILITY FIX: March 26, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;sektion=8">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;sektion=8">isakmpd(8)</a>
Line 267 
Line 267 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/017_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/017_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="approval"></a>  <li id="approval">
 <font color="#009000"><strong>016: SECURITY FIX: March 19, 2002</strong></font>  <font color="#009000"><strong>016: SECURITY FIX: March 19, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under certain conditions, on systems using YP with netgroups in the password  Under certain conditions, on systems using YP with netgroups in the password
Line 284 
Line 284 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/016_approval.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/016_approval.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="zlib"></a>  <li id="zlib">
 <font color="#009000"><strong>015: RELIABILITY FIX: March 13, 2002</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: March 13, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under some circumstances the zlib compression library can free dynamically  Under some circumstances the zlib compression library can free dynamically
Line 296 
Line 296 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/015_zlib.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/015_zlib.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssh"></a>  <li id="openssh">
 <font color="#009000"><strong>014: SECURITY FIX: March 8, 2002</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: March 8, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A local user can gain super-user privileges due to an off-by-one check  A local user can gain super-user privileges due to an off-by-one check
Line 304 
Line 304 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/014_openssh.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/014_openssh.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="syspipe"></a>  <li id="syspipe">
 <font color="#009000"><strong>013: RELIABILITY FIX: February 4, 2002</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: February 4, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The wrong filedescriptors are released when pipe(2) failed.<br>  The wrong filedescriptors are released when pipe(2) failed.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/013_syspipe.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/013_syspipe.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ptrace"></a>  <li id="ptrace">
 <font color="#009000"><strong>012: SECURITY FIX: January 21, 2002</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: January 21, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A race condition between the ptrace(2) and execve(2) system calls allows  A race condition between the ptrace(2) and execve(2) system calls allows
Line 320 
Line 320 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/012_ptrace.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/012_ptrace.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo"></a>  <li id="sudo">
 <font color="#009000"><strong>011: SECURITY FIX: January 17, 2002</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: January 17, 2002</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 If the Postfix sendmail replacement is installed on a system an  If the Postfix sendmail replacement is installed on a system an
Line 334 
Line 334 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/011_sudo.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/011_sudo.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipip"></a>  <li id="ipip">
 <font color="#009000"><strong>010: RELIABILITY FIX: December 13, 2001</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: December 13, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Systems running with IP-in-IP encapsulation can be made to crash by  Systems running with IP-in-IP encapsulation can be made to crash by
Line 342 
Line 342 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/010_ipip.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/010_ipip.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="macppcinstall"></a>  <li id="macppcinstall">
 <font color="#009000"><strong>009: INSTALLATION FIX: December 11, 2001</strong></font>  <font color="#009000"><strong>009: INSTALLATION FIX: December 11, 2001</strong></font>
 <br>  <br>
 The 3.0 CD2 was created with an error which means that the instructions  The 3.0 CD2 was created with an error which means that the instructions
Line 352 
Line 352 
 <br>  <br>
 <code>boot cd:,OFWBOOT /3.0/macppc/bsd.rd</code>  <code>boot cd:,OFWBOOT /3.0/macppc/bsd.rd</code>
 <p>  <p>
 <li><a name="lpd"></a>  <li id="lpd">
 <font color="#009000"><strong>008: SECURITY FIX: November 28, 2001</strong></font>  <font color="#009000"><strong>008: SECURITY FIX: November 28, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security issue exists in the lpd daemon that may allow an attacker  A security issue exists in the lpd daemon that may allow an attacker
Line 364 
Line 364 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/008_lpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/008_lpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="vi.recover"></a>  <li id="vi.recover">
 <font color="#009000"><strong>007: SECURITY FIX: November 13, 2001</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: November 13, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A security issue exists in the vi.recover script that may allow an attacker  A security issue exists in the vi.recover script that may allow an attacker
Line 373 
Line 373 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/007_recover.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/007_recover.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pf"></a>  <li id="pf">
 <font color="#009000"><strong>006: SECURITY FIX: November 13, 2001</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: November 13, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>
Line 382 
Line 382 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/006_pf.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/006_pf.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="altivec"></a>  <li id="altivec">
 <font color="#009000"><strong>005: RELIABILITY FIX: November 12, 2001</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: November 12, 2001</strong></font>
 <br>  <br>
 Execution of Altivec instructions will crash the kernel.  Execution of Altivec instructions will crash the kernel.
Line 390 
Line 390 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/macppc/005_altivec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/macppc/005_altivec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="hifn"></a>  <li id="hifn">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 12, 2001</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: November 12, 2001</strong></font>
 <br>  <br>
 Hifn7751 based cards may stop working on certain motherboards due to  Hifn7751 based cards may stop working on certain motherboards due to
Line 399 
Line 399 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/i386/004_hifn.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/i386/004_hifn.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sparc64cd"></a>  <li id="sparc64cd">
 <font color="#009000"><strong>003: RELIABILITY FIX: November 12, 2001</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: November 12, 2001</strong></font>
 <br>  <br>
 Access to a CD drive on the PCI ultrasparc machines results in a continuous stream  Access to a CD drive on the PCI ultrasparc machines results in a continuous stream
Line 408 
Line 408 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/sparc64/003_sparc64cd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.0/sparc64/003_sparc64cd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sshd"></a>  <li id="sshd">
 <font color="#009000"><strong>002: SECURITY FIX: November 12, 2001</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: November 12, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&amp;sektion=8">sshd(8)</a>
Line 436 
Line 436 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 This is the second version of this patch.  This is the second version of this patch.
 <p>  <p>
 <li><a name="hosts"></a>  <li id="hosts">
 <font color="#009000"><strong>001: INSTALL ISSUE: November 12, 2001</strong></font>  <font color="#009000"><strong>001: INSTALL ISSUE: November 12, 2001</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A small bug in the installation script causes the <tt>/etc/hosts</tt> file to  A small bug in the installation script causes the <tt>/etc/hosts</tt> file to

Legend:
Removed from v.1.80  
changed lines
  Added in v.1.81