[BACK]Return to errata34.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata34.html between version 1.58 and 1.59

version 1.58, 2014/03/28 03:04:30 version 1.59, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2004 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_3_4</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_3_4</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <a name="all"></a>  <a name="all"></a>
Line 87 
Line 89 
 credentials on a socket.  credentials on a socket.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lynx"></a>  <li><a name="lynx"></a>
 <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 100 
Line 102 
 to exhaust memory and then crash when parsing such pages.  to exhaust memory and then crash when parsing such pages.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pppd"></a>  <li><a name="pppd"></a>
 <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 109 
Line 111 
 be used to deny service to other users.  be used to deny service to other users.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/033_pppd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/033_pppd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bind"></a>  <li><a name="bind"></a>
 <font color="#009000"><strong>032: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>032: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 118 
Line 120 
 thus slow DNS queries.  thus slow DNS queries.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/032_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/032_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="radius"></a>  <li><a name="radius"></a>
 <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font><br>  <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font><br>
Line 129 
Line 131 
 attacker.  Note that OpenBSD does not ship with radius authentication enabled.  attacker.  Note that OpenBSD does not ship with radius authentication enabled.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/031_radius.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/031_radius.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xpm"></a>  <li><a name="xpm"></a>
 <font color="#009000"><strong>030: SECURITY FIX: September 16, 2004</strong></font><br>  <font color="#009000"><strong>030: SECURITY FIX: September 16, 2004</strong></font><br>
Line 142 
Line 144 
 an application that handles XPM images, if they could escape ProPolice.  an application that handles XPM images, if they could escape ProPolice.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/030_xpm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/030_xpm.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd4"></a>  <li><a name="httpd4"></a>
 <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font><br>  <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font><br>
Line 153 
Line 155 
 dbm file.  dbm file.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/029_httpd4.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/029_httpd4.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="bridge"></a>  <li><a name="bridge"></a>
Line 165 
Line 167 
 with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.  with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="icmp"></a>  <li><a name="icmp"></a>
 <font color="#009000"><strong>027: RELIABILITY FIX: August 25, 2004</strong></font><br>  <font color="#009000"><strong>027: RELIABILITY FIX: August 25, 2004</strong></font><br>
Line 175 
Line 177 
 <a href="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</a>  <a href="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/027_icmp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/027_icmp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li><a name="rnd"></a>
 <font color="#009000"><strong>026: RELIABILITY FIX: Jul 25, 2004</strong></font><br>  <font color="#009000"><strong>026: RELIABILITY FIX: Jul 25, 2004</strong></font><br>
Line 184 
Line 186 
 manifested itself as a FPU related crash on boot up.  manifested itself as a FPU related crash on boot up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/026_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/026_rnd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd3"></a>  <li><a name="httpd3"></a>
 <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font><br>  <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font><br>
Line 197 
Line 199 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/025_httpd3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/025_httpd3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd3"></a>  <li><a name="isakmpd3"></a>
 <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font><br>  <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font><br>
Line 209 
Line 211 
 tunnels at will.  tunnels at will.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/024_isakmpd3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/024_isakmpd3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs3"></a>  <li><a name="cvs3"></a>
 <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font><br>  <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font><br>
Line 219 
Line 221 
 code with the same privileges as the CVS server program.  code with the same privileges as the CVS server program.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/023_cvs3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/023_cvs3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li><a name="kerberos"></a>
 <font color="#00900"><strong>022: SECURITY FIX: May 30,  <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font><br>
 2004</strong></font><br>  A flaw in the Kerberos V
 A flaw in the Kerberos V <a  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>
 href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>  
 server could result in the administrator of a Kerberos realm having  server could result in the administrator of a Kerberos realm having
 the ability to impersonate any principal in any other realm which  the ability to impersonate any principal in any other realm which
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
Line 233 
Line 234 
 more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">  more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">
 Heimdal's announcement</a>.  Heimdal's announcement</a>.
 <br>  <br>
 <a  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">  A source code patch exists which remedies this problem.</a>
 A source code patch exists which remedies this problem</a>.<br>  
 <p>  <p>
 <li><a name="cvs2"></a>  <li><a name="cvs2"></a>
 <font color="#009000"><strong>021: SECURITY FIX: May 20,  <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font><br>
 2004</strong></font><br>  
 A heap overflow in the  A heap overflow in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server has been discovered that can be exploited by clients sending  server has been discovered that can be exploited by clients sending
Line 247 
Line 246 
 with the same privileges as the CVS server program.  with the same privileges as the CVS server program.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/021_cvs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/021_cvs2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="procfs"></a>  <li><a name="procfs"></a>
 <font color="#009000"><strong>020: SECURITY FIX: May 13,  <font color="#009000"><strong>020: SECURITY FIX: May 13, 2004</strong></font><br>
 2004</strong></font><br>  
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp2"></a>  <li><a name="tcp2"></a>
 <font color="#009000"><strong>019: RELIABILITY FIX: May 6,  <font color="#009000"><strong>019: RELIABILITY FIX: May 6, 2004</strong></font><br>
 2004</strong></font><br>  
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/019_tcp2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/019_tcp2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="gdt"></a>  <li><a name="gdt"></a>
 <font color="#009000"><strong>018: RELIABILITY FIX: May 5,  <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Under load "recent model"  Under load "recent model"
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>
 controllers will lock up.  controllers will lock up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs"></a>  <li><a name="cvs"></a>
 <font color="#009000"><strong>017: SECURITY FIX: May 5,  <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,
 allowing malicious clients to create files outside the repository, allowing  allowing malicious clients to create files outside the repository, allowing
Line 286 
Line 281 
 repository.  repository.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/017_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/017_cvs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssl"></a>  <li><a name="openssl"></a>
 <font color="#009000"><strong>016: RELIABILITY FIX: March 17,  <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font><br>
 2004</strong></font><br>  
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.
 A remote attacker can use the bug to cause an OpenSSL application to crash;  A remote attacker can use the bug to cause an OpenSSL application to crash;
 this may lead to a denial of service.  this may lead to a denial of service.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/016_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/016_openssl.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd2"></a>  <li><a name="isakmpd2"></a>
 <font color="#009000"><strong>015: RELIABILITY FIX: March 17,  <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font><br>
 2004</strong></font><br>  
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 have been discovered.  An attacker could send malformed ISAKMP messages and  have been discovered.  An attacker could send malformed ISAKMP messages and
Line 309 
Line 302 
 and removes some memory leaks.  and removes some memory leaks.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li><a name="httpd2"></a>
 <font color="#009000"><strong>014: SECURITY FIX: March 13,  <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font><br>
 2004</strong></font><br>  
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)'s</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)'s</a>
 access module, using IP addresses without a netmask on big endian 64-bit  access module, using IP addresses without a netmask on big endian 64-bit
 platforms causes the rules to fail to match. This only affects sparc64.  platforms causes the rules to fail to match. This only affects sparc64.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/014_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/014_httpd2.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li><a name="tcp"></a>
 <font color="#009000"><strong>013: RELIABILITY FIX: March 8,  <font color="#009000"><strong>013: RELIABILITY FIX: March 8, 2004</strong></font><br>
 2004</strong></font><br>  
 OpenBSD's TCP/IP stack did not impose limits on how many out-of-order  OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
 TCP segments are queued in the system.  An attacker could  TCP segments are queued in the system.  An attacker could
 send out-of-order TCP segments and trick the system into using all  send out-of-order TCP segments and trick the system into using all
 available memory buffers.  available memory buffers.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/013_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/013_tcp.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="font"></a>  <li><a name="font"></a>
 <font color="#009000"><strong>012: RELIABILITY FIX: February 14,  <font color="#009000"><strong>012: RELIABILITY FIX: February 14, 2004</strong></font><br>
 2004</strong></font><br>  
 Several buffer overflows exist in the code parsing  Several buffer overflows exist in the code parsing
 font.aliases files in XFree86. Thanks to ProPolice, these cannot be  font.aliases files in XFree86. Thanks to ProPolice, these cannot be
 exploited to gain privileges, but they can cause the X server to abort.  exploited to gain privileges, but they can cause the X server to abort.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/012_font.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/012_font.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ip6"></a>  <li><a name="ip6"></a>
 <font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font><br>  <font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font><br>
Line 350 
Line 340 
 TCP ports.  TCP ports.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/011_ip6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/011_ip6.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li><a name="sysvshm"></a>
 <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font><br>  <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font><br>
Line 360 
Line 350 
 under certain circumstances.  under certain circumstances.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/010_sysvshm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/010_sysvshm.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font><br>  <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font><br>
Line 371 
Line 361 
 installed.  installed.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/009_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/009_isakmpd.patch">
 A source code patch exists which remedies these problems</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sem"></a>  <li><a name="sem"></a>
 <font color="#009000"><strong>008: RELIABILITY FIX: November 20, 2003</strong></font><br>  <font color="#009000"><strong>008: RELIABILITY FIX: November 20, 2003</strong></font><br>
Line 382 
Line 372 
 certain arguments.  certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uvm"></a>  <li><a name="uvm"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font><br>  <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font><br>
Line 390 
Line 380 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="exec"></a>  <li><a name="exec"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: November 4, 2003</strong></font><br>  <font color="#009000"><strong>005: RELIABILITY FIX: November 4, 2003</strong></font><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: November 1, 2003</strong></font><br>  <font color="#009000"><strong>004: RELIABILITY FIX: November 1, 2003</strong></font><br>
Line 408 
Line 398 
 is believed that ProPolice will prevent code execution).  is believed that ProPolice will prevent code execution).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="arp"></a>  <li><a name="arp"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: November 1, 2003</strong></font><br>  <font color="#009000"><strong>003: RELIABILITY FIX: November 1, 2003</strong></font><br>
 It is possible for a local user to cause a system panic by flooding it with spoofed ARP  It is possible for a local user to cause a system panic by flooding it with spoofed ARP
 requests.<br>  requests.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/003_arp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/003_arp.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="asn1"></a>  <li><a name="asn1"></a>
 <font color="#009000"><strong>002: SECURITY FIX: November 1, 2003</strong></font><br>  <font color="#009000"><strong>002: SECURITY FIX: November 1, 2003</strong></font><br>
Line 424 
Line 414 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.
 This does not affect OpenSSH.<br>  This does not affect OpenSSH.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cd_booklet"></a>  <li><a name="cd_booklet"></a>
 <font color="#009000"><strong>001: DOCUMENTATION FIX: November 1, 2003</strong></font><br>  <font color="#009000"><strong>001: DOCUMENTATION FIX: November 1, 2003</strong></font><br>
Line 453 
Line 443 
 for this to happen.  for this to happen.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name="alpha"></a>  
 <h3><font color="#e00000">alpha</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mac68k"></a>  
 <h3><font color="#e00000">mac68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc"></a>  
 <h3><font color="#e00000">sparc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc64"></a>  
 <h3><font color="#e00000">sparc64</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hppa"></a>  
 <h3><font color="#e00000">hppa</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hp300"></a>  
 <h3><font color="#e00000">hp300</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mvme68k"></a>  
 <h3><font color="#e00000">mvme68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="macppc"></a>  
 <h3><font color="#e00000">macppc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="vax"></a>  
 <h3><font color="#e00000">vax</font></h3>  
 <ul>  
 <li>No problems identified yet.  
   
 </ul>  </ul>
   

Legend:
Removed from v.1.58  
changed lines
  Added in v.1.59