[BACK]Return to errata34.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata34.html between version 1.89 and 1.90

version 1.89, 2019/04/02 12:46:56 version 1.90, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.4 Errata</title>  <title>OpenBSD 3.4 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata34.html">  <link rel="canonical" href="https://www.openbsd.org/errata34.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.4 Errata</font>  3.4 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 85 
Line 84 
   
 <ul>  <ul>
 <li id="pfkey">  <li id="pfkey">
 <font color="#009000"><strong>035: SECURITY FIX: December 13, 2004</strong></font>  <strong>035: SECURITY FIX: December 13, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
 <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>
Line 98 
Line 97 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="lynx">  <li id="lynx">
 <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>034: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
 <a href="https://man.openbsd.org/OpenBSD-3.4/lynx.1">lynx(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/lynx.1">lynx(1)</a>
Line 112 
Line 111 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pppd">  <li id="pppd">
 <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>033: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.4/pppd.8">pppd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/pppd.8">pppd(8)</a>
 contains a bug that allows an attacker to crash his own connection, but it cannot  contains a bug that allows an attacker to crash his own connection, but it cannot
Line 122 
Line 121 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="bind">  <li id="bind">
 <font color="#009000"><strong>032: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>032: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in  BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in
 cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and  cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and
Line 132 
Line 131 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="radius">  <li id="radius">
 <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font>  <strong>031: SECURITY FIX: September 20, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
 <a href="https://man.openbsd.org/OpenBSD-3.4/login_radius.8">login_radius(8)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.4/login_radius.8">login_radius(8)</a>,
Line 144 
Line 143 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xpm">  <li id="xpm">
 <font color="#009000"><strong>030: SECURITY FIX: September 16, 2004</strong></font>  <strong>030: SECURITY FIX: September 16, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Chris Evans reported several flaws (stack and integer overflows) in the  Chris Evans reported several flaws (stack and integer overflows) in the
 <a href="http://www.inria.fr/koala/lehors/xpm.html">Xpm</a>  <a href="http://www.inria.fr/koala/lehors/xpm.html">Xpm</a>
Line 158 
Line 157 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd4">  <li id="httpd4">
 <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font>  <strong>029: SECURITY FIX: September 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>
 's mod_rewrite module can be made to write one zero byte in an arbitrary memory  's mod_rewrite module can be made to write one zero byte in an arbitrary memory
Line 171 
Line 170 
 <p>  <p>
   
 <li id="bridge">  <li id="bridge">
 <font color="#009000"><strong>028: RELIABILITY FIX: August 26, 2004</strong></font>  <strong>028: RELIABILITY FIX: August 26, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
 <a href="https://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>  <a href="https://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>
Line 183 
Line 182 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="icmp">  <li id="icmp">
 <font color="#009000"><strong>027: RELIABILITY FIX: August 25, 2004</strong></font>  <strong>027: RELIABILITY FIX: August 25, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Improved verification of ICMP errors in order to minimize the impact of ICMP attacks  Improved verification of ICMP errors in order to minimize the impact of ICMP attacks
 against TCP.  against TCP.
Line 194 
Line 193 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="rnd">  <li id="rnd">
 <font color="#009000"><strong>026: RELIABILITY FIX: Jul 25, 2004</strong></font>  <strong>026: RELIABILITY FIX: Jul 25, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under a certain network load the kernel can run out of stack space.  This was  Under a certain network load the kernel can run out of stack space.  This was
 encountered in an environment using CARP on a VLAN interface.  This issue initially  encountered in an environment using CARP on a VLAN interface.  This issue initially
Line 204 
Line 203 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd3">  <li id="httpd3">
 <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font>  <strong>025: SECURITY FIX: June 12, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
 <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>
Line 218 
Line 217 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="isakmpd3">  <li id="isakmpd3">
 <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font>  <strong>024: SECURITY FIX: June 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
Line 231 
Line 230 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs3">  <li id="cvs3">
 <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font>  <strong>023: SECURITY FIX: June 9, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
 <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>
Line 242 
Line 241 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kerberos">  <li id="kerberos">
 <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font>  <strong>022: SECURITY FIX: May 30, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
 <a href="https://man.openbsd.org/OpenBSD-3.4/kdc.8">kdc(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/kdc.8">kdc(8)</a>
Line 257 
Line 256 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs2">  <li id="cvs2">
 <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font>  <strong>021: SECURITY FIX: May 20, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
 <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>
Line 269 
Line 268 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="procfs">  <li id="procfs">
 <font color="#009000"><strong>020: SECURITY FIX: May 13, 2004</strong></font>  <strong>020: SECURITY FIX: May 13, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
 <br>  <br>
Line 277 
Line 276 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="tcp2">  <li id="tcp2">
 <font color="#009000"><strong>019: RELIABILITY FIX: May 6, 2004</strong></font>  <strong>019: RELIABILITY FIX: May 6, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
 <br>  <br>
Line 285 
Line 284 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="gdt">  <li id="gdt">
 <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font>  <strong>018: RELIABILITY FIX: May 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
 <a href="https://man.openbsd.org/OpenBSD-3.4/gdt.4">gdt(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/gdt.4">gdt(4)</a>
Line 295 
Line 294 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs">  <li id="cvs">
 <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font>  <strong>017: SECURITY FIX: May 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.4/cvs.1">cvs(1)</a>,
Line 308 
Line 307 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="openssl">  <li id="openssl">
 <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font>  <strong>016: RELIABILITY FIX: March 17, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
 <a href="https://man.openbsd.org/OpenBSD-3.4/ssl.3">ssl(3)</a>.  <a href="https://man.openbsd.org/OpenBSD-3.4/ssl.3">ssl(3)</a>.
Line 319 
Line 318 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="isakmpd2">  <li id="isakmpd2">
 <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font>  <strong>015: RELIABILITY FIX: March 17, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
 <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>
Line 331 
Line 330 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd2">  <li id="httpd2">
 <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font>  <strong>014: SECURITY FIX: March 13, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
 <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)'s</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)'s</a>
Line 342 
Line 341 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="tcp">  <li id="tcp">
 <font color="#009000"><strong>013: RELIABILITY FIX: March 8, 2004</strong></font>  <strong>013: RELIABILITY FIX: March 8, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD's TCP/IP stack did not impose limits on how many out-of-order  OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
 TCP segments are queued in the system.  An attacker could  TCP segments are queued in the system.  An attacker could
Line 353 
Line 352 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="font">  <li id="font">
 <font color="#009000"><strong>012: RELIABILITY FIX: February 14, 2004</strong></font>  <strong>012: RELIABILITY FIX: February 14, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several buffer overflows exist in the code parsing  Several buffer overflows exist in the code parsing
 font.aliases files in XFree86. Thanks to ProPolice, these cannot be  font.aliases files in XFree86. Thanks to ProPolice, these cannot be
Line 363 
Line 362 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ip6">  <li id="ip6">
 <font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font>  <strong>011: SECURITY FIX: February 8, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An IPv6 MTU handling problem exists that could be used by an attacker  An IPv6 MTU handling problem exists that could be used by an attacker
 to cause a denial of service attack against hosts with reachable IPv6  to cause a denial of service attack against hosts with reachable IPv6
Line 373 
Line 372 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sysvshm">  <li id="sysvshm">
 <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font>  <strong>010: SECURITY FIX: February 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A reference counting bug exists in the  A reference counting bug exists in the
 <a href="https://man.openbsd.org/OpenBSD-3.4/shmat.2">shmat(2)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/shmat.2">shmat(2)</a>
Line 384 
Line 383 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font>  <strong>009: SECURITY FIX: January 13, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several message handling flaws in  Several message handling flaws in
 <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/isakmpd.8">isakmpd(8)</a>
Line 396 
Line 395 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="sem">  <li id="sem">
 <font color="#009000"><strong>008: RELIABILITY FIX: November 20, 2003</strong></font>  <strong>008: RELIABILITY FIX: November 20, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An improper bounds check makes it possible for a local user to cause a crash  An improper bounds check makes it possible for a local user to cause a crash
 by passing the  by passing the
Line 408 
Line 407 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="uvm">  <li id="uvm">
 <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font>  <strong>007: RELIABILITY FIX: November 20, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
 <a href="https://man.openbsd.org/OpenBSD-3.4/sysctl.3">sysctl(3)</a> with certain arguments.  <a href="https://man.openbsd.org/OpenBSD-3.4/sysctl.3">sysctl(3)</a> with certain arguments.
Line 417 
Line 416 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="ibcs2">  <li id="ibcs2">
 <font color="#009000"><strong>006: SECURITY FIX: November 17, 2003</strong></font>  <strong>006: SECURITY FIX: November 17, 2003</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 It may be possible for a local user to overrun the stack in  It may be possible for a local user to overrun the stack in
 <a href="https://man.openbsd.org/OpenBSD-3.4/compat_ibcs2.8">compat_ibcs2(8)</a>.<br>  <a href="https://man.openbsd.org/OpenBSD-3.4/compat_ibcs2.8">compat_ibcs2(8)</a>.<br>
Line 430 
Line 429 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="exec">  <li id="exec">
 <font color="#009000"><strong>005: RELIABILITY FIX: November 4, 2003</strong></font>  <strong>005: RELIABILITY FIX: November 4, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
 <br>  <br>
Line 438 
Line 437 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 1, 2003</strong></font>  <strong>004: RELIABILITY FIX: November 1, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>  A user with write permission to <code>httpd.conf</code> or a <code>.htaccess</code>
 file can crash  file can crash
 <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.4/httpd.8">httpd(8)</a>
 or potentially run arbitrary code as the user <tt>www</tt> (although it  or potentially run arbitrary code as the user <code>www</code> (although it
 is believed that ProPolice will prevent code execution).  is believed that ProPolice will prevent code execution).
 <br>  <br>
 <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">  <a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="arp">  <li id="arp">
 <font color="#009000"><strong>003: RELIABILITY FIX: November 1, 2003</strong></font>  <strong>003: RELIABILITY FIX: November 1, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by flooding it with spoofed ARP  It is possible for a local user to cause a system panic by flooding it with spoofed ARP
 requests.<br>  requests.<br>
Line 458 
Line 457 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="asn1">  <li id="asn1">
 <font color="#009000"><strong>002: SECURITY FIX: November 1, 2003</strong></font>  <strong>002: SECURITY FIX: November 1, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The use of certain ASN.1 encodings or malformed public keys may allow an  The use of certain ASN.1 encodings or malformed public keys may allow an
 attacker to mount a denial of service attack against applications linked with  attacker to mount a denial of service attack against applications linked with
Line 468 
Line 467 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cd_booklet">  <li id="cd_booklet">
 <font color="#009000"><strong>001: DOCUMENTATION FIX: November 1, 2003</strong></font>  <strong>001: DOCUMENTATION FIX: November 1, 2003</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The CD insert documentation has an incorrect example for package installation.<br>  The CD insert documentation has an incorrect example for package installation.<br>
 Where it is written:<p>  Where it is written:<p>
 <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  <b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 # pkg_add https://ftp.openbsd.org/pub/OpenBSD/3.4/packages/i386</strong><p>  # pkg_add https://ftp.openbsd.org/pub/OpenBSD/3.4/packages/i386</b><p>
 It should instead read:<p>  It should instead read:<p>
 <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  <b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 # pkg_add https://ftp.openbsd.org/pub/OpenBSD/3.4/packages/i386/</strong><p>  # pkg_add https://ftp.openbsd.org/pub/OpenBSD/3.4/packages/i386/</b><p>
 The extra <strong>/</strong> at the end is important.  We do not make  The extra <b>/</b> at the end is important.  We do not make
 patch files available for things printed on paper.  patch files available for things printed on paper.
 <p>  <p>
   
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.89  
changed lines
  Added in v.1.90