[BACK]Return to errata33.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata33.html between version 1.50 and 1.51

version 1.50, 2014/03/28 03:04:30 version 1.51, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2004 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 44 
Line 43 
 <a href="errata39.html">3.9</a>,  <a href="errata39.html">3.9</a>,
 <a href="errata40.html">4.0</a>,  <a href="errata40.html">4.0</a>,
 <a href="errata41.html">4.1</a>,  <a href="errata41.html">4.1</a>,
 <a href="errata42.html">4.1</a>,  <a href="errata42.html">4.2</a>,
 <a href="errata43.html">4.3</a>,  <a href="errata43.html">4.3</a>,
 <a href="errata44.html">4.4</a>,  <a href="errata44.html">4.4</a>,
 <a href="errata45.html">4.5</a>,  <a href="errata45.html">4.5</a>,
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_3_3</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_3_3</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <a name="all"></a>  <a name="all"></a>
 <h3><font color="#e00000">All architectures</font></h3>  <h3><font color="#e00000">All architectures</font></h3>
 <ul>  <ul>
 <li><a name="cvs"></a>  <li><a name="cvs"></a>
 <font color="#009000"><strong>022: SECURITY FIX: May 5,  <font color="#009000"><strong>022: SECURITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,
 allowing malicious clients to create files outside the repository, allowing  allowing malicious clients to create files outside the repository, allowing
Line 88 
Line 89 
 repository.  repository.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/022_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/022_cvs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssl"></a>  <li><a name="openssl"></a>
 <font color="#009000"><strong>021: RELIABILITY FIX: March 17,  <font color="#009000"><strong>021: RELIABILITY FIX: March 17, 2004</strong></font><br>
 2004</strong></font><br>  
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.
 A remote attacker can use the bug to cause an OpenSSL application to crash;  A remote attacker can use the bug to cause an OpenSSL application to crash;
 this may lead to a denial of service.  this may lead to a denial of service.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/021_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/021_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd2"></a>  <li><a name="isakmpd2"></a>
 <font color="#009000"><strong>020: RELIABILITY FIX: March 17,  <font color="#009000"><strong>020: RELIABILITY FIX: March 17, 2004</strong></font><br>
 2004</strong></font><br>  
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 have been discovered.  An attacker could send malformed ISAKMP messages and  have been discovered.  An attacker could send malformed ISAKMP messages and
Line 111 
Line 110 
 and removes some memory leaks.  and removes some memory leaks.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/020_isakmpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li><a name="httpd2"></a>
 <font color="#009000"><strong>019: SECURITY FIX: March 13,  <font color="#009000"><strong>019: SECURITY FIX: March 13, 2004</strong></font><br>
 2004</strong></font><br>  
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)'s</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)'s</a>
 access module, using IP addresses without a netmask on big endian 64-bit  access module, using IP addresses without a netmask on big endian 64-bit
 platforms causes the rules to fail to match. This only affects sparc64.  platforms causes the rules to fail to match. This only affects sparc64.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/019_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/019_httpd2.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li><a name="tcp"></a>
 <font color="#009000"><strong>018: RELIABILITY FIX: March 8,  <font color="#009000"><strong>018: RELIABILITY FIX: March 8, 2004</strong></font><br>
 2004</strong></font><br>  
 OpenBSD's TCP/IP stack did not impose limits on how many out-of-order  OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
 TCP segments are queued in the system.  An attacker could  TCP segments are queued in the system.  An attacker could
 send out-of-order TCP segments and trick the system into using all  send out-of-order TCP segments and trick the system into using all
 available memory buffers.  available memory buffers.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/018_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/018_tcp.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="font"></a>  <li><a name="font"></a>
 <font color="#009000"><strong>017: RELIABILITY FIX: February 14,  <font color="#009000"><strong>017: RELIABILITY FIX: February 14, 2004</strong></font><br>
 2004</strong></font><br>  
 Several buffer overflows exist in the code parsing  Several buffer overflows exist in the code parsing
 font.aliases files in XFree86. Thanks to ProPolice, these cannot be  font.aliases files in XFree86. Thanks to ProPolice, these cannot be
 exploited to gain privileges, but they can cause the X server to abort.  exploited to gain privileges, but they can cause the X server to abort.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/017_font.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/017_font.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ip6"></a>  <li><a name="ip6"></a>
 <font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font><br>  <font color="#009000"><strong>016: SECURITY FIX: February 8, 2004</strong></font><br>
Line 152 
Line 148 
 TCP ports.  TCP ports.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/016_ip6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/016_ip6.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li><a name="sysvshm"></a>
 <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font><br>  <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font><br>
Line 162 
Line 158 
 under certain circumstances.  under certain circumstances.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/015_sysvshm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/015_sysvshm.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>014: SECURITY FIX: January 15, 2004</strong></font><br>  <font color="#009000"><strong>014: SECURITY FIX: January 15, 2004</strong></font><br>
Line 171 
Line 167 
 have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs.  have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/014_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/014_isakmpd.patch">
 A source code patch exists which remedies these problems</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sem"></a>  <li><a name="sem"></a>
 <font color="#009000"><strong>013: RELIABILITY FIX: November 20, 2003</strong></font><br>  <font color="#009000"><strong>013: RELIABILITY FIX: November 20, 2003</strong></font><br>
Line 182 
Line 178 
 certain arguments.  certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/013_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/013_sem.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uvm"></a>  <li><a name="uvm"></a>
 <font color="#009000"><strong>012: RELIABILITY FIX: November 20, 2003</strong></font><br>  <font color="#009000"><strong>012: RELIABILITY FIX: November 20, 2003</strong></font><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.<br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/012_uvm.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="exec"></a>  <li><a name="exec"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font><br>  <font color="#009000"><strong>010: RELIABILITY FIX: November 4, 2003</strong></font><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/010_exec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/010_exec.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
 <font color="#009000"><strong>009: RELIABILITY FIX: October 29, 2003</strong></font><br>  <font color="#009000"><strong>009: RELIABILITY FIX: October 29, 2003</strong></font><br>
Line 207 
Line 203 
 is believed that ProPolice will prevent code execution).  is believed that ProPolice will prevent code execution).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/009_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/009_httpd.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="arp"></a>  <li><a name="arp"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: October 1, 2003</strong></font><br>  <font color="#009000"><strong>008: RELIABILITY FIX: October 1, 2003</strong></font><br>
 It is possible for a local user to cause a system panic by flooding it with spoofed ARP  It is possible for a local user to cause a system panic by flooding it with spoofed ARP
 requests.<br>  requests.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/008_arp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/008_arp.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="asn1"></a>  <li><a name="asn1"></a>
 <font color="#009000"><strong>007: SECURITY FIX: October 1, 2003</strong></font><br>  <font color="#009000"><strong>007: SECURITY FIX: October 1, 2003</strong></font><br>
Line 223 
Line 219 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.
 This does not affect OpenSSH.<br>  This does not affect OpenSSH.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/007_asn1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/007_asn1.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pfnorm"></a>  <li><a name="pfnorm"></a>
 <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font><br>  <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font><br>
Line 231 
Line 227 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.
 At least one of them could be used to panic pf with active scrub rules remotely.<br>  At least one of them could be used to panic pf with active scrub rules remotely.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
 <font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font><br>  <font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font><br>
Line 239 
Line 235 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>
 may allow an attacker to gain root privileges.<br>  may allow an attacker to gain root privileges.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/005_sendmail.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/005_sendmail.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 NOTE: this is the <em>second</em> revision of the patch that fixes an additional  NOTE: this is the <em>second</em> revision of the patch that fixes an additional
 problem.  problem.
 <p>  <p>
Line 247 
Line 243 
 <font color="#009000"><strong>004: SECURITY FIX: September 16, 2003</strong></font><br>  <font color="#009000"><strong>004: SECURITY FIX: September 16, 2003</strong></font><br>
 All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.  All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
 It is unclear whether or not this bug is exploitable.<br>  It is unclear whether or not this bug is exploitable.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/004_sshbuffer.patch">A  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/004_sshbuffer.patch">
 source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 NOTE: this is the <em>second</em> revision of the patch that fixes an additional  NOTE: this is the <em>second</em> revision of the patch that fixes an additional
 problem.  problem.
 <p>  <p>
Line 257 
Line 253 
 Root may be able to reduce the security level by taking advantage of  Root may be able to reduce the security level by taking advantage of
 an integer overflow when the semaphore limits are made very large.<br>  an integer overflow when the semaphore limits are made very large.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/003_sysvsem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/003_sysvsem.patch">
 A source code patch exists which remedies the problem</a>.  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="semget"></a>  <li><a name="semget"></a>
 <font color="#009000"><strong>002: RELIABILITY FIX: August 20, 2003</strong></font><br>  <font color="#009000"><strong>002: RELIABILITY FIX: August 20, 2003</strong></font><br>
Line 265 
Line 261 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=semget&amp;sektion=2">semget(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=semget&amp;sektion=2">semget(2)</a>
 system call can allow a local user to cause a kernel panic.<br>  system call can allow a local user to cause a kernel panic.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/002_semget.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/002_semget.patch">
 A source code patch exists which remedies the problem</a>.  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="realpath"></a>  <li><a name="realpath"></a>
 <font color="#009000"><strong>001: SECURITY FIX: August 4, 2003</strong></font><br>  <font color="#009000"><strong>001: SECURITY FIX: August 4, 2003</strong></font><br>
Line 275 
Line 271 
 it is possible that this bug may allow an attacker to gain escalated privileges  it is possible that this bug may allow an attacker to gain escalated privileges
 on OpenBSD.<br>  on OpenBSD.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/001_realpath.patch">
 A source code patch exists which remedies the problem</a>.  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
Line 288 
Line 284 
 privileges due to a stack overrun in  privileges due to a stack overrun in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name="alpha"></a>  
 <h3><font color="#e00000">alpha</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mac68k"></a>  
 <h3><font color="#e00000">mac68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc"></a>  
 <h3><font color="#e00000">sparc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc64"></a>  
 <h3><font color="#e00000">sparc64</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hppa"></a>  
 <h3><font color="#e00000">hppa</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hp300"></a>  
 <h3><font color="#e00000">hp300</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mvme68k"></a>  
 <h3><font color="#e00000">mvme68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="macppc"></a>  
 <h3><font color="#e00000">macppc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="vax"></a>  
 <h3><font color="#e00000">vax</font></h3>  
 <ul>  
 <li>No problems identified yet.  
   
 </ul>  </ul>
   

Legend:
Removed from v.1.50  
changed lines
  Added in v.1.51