[BACK]Return to errata34.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata34.html between version 1.65 and 1.66

version 1.65, 2014/10/02 14:34:45 version 1.66, 2015/02/14 04:36:51
Line 80 
Line 80 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="pfkey"></a>  <li id="pfkey">
 <font color="#009000"><strong>035: SECURITY FIX: December 13, 2004</strong></font>  <font color="#009000"><strong>035: SECURITY FIX: December 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
Line 93 
Line 93 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lynx"></a>  <li id="lynx">
 <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
Line 107 
Line 107 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pppd"></a>  <li id="pppd">
 <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>
Line 117 
Line 117 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/033_pppd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/033_pppd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bind"></a>  <li id="bind">
 <font color="#009000"><strong>032: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>032: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in  BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in
Line 127 
Line 127 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/032_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/032_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="radius"></a>  <li id="radius">
 <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
Line 139 
Line 139 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/031_radius.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/031_radius.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xpm"></a>  <li id="xpm">
 <font color="#009000"><strong>030: SECURITY FIX: September 16, 2004</strong></font>  <font color="#009000"><strong>030: SECURITY FIX: September 16, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Chris Evans reported several flaws (stack and integer overflows) in the  Chris Evans reported several flaws (stack and integer overflows) in the
Line 153 
Line 153 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/030_xpm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/030_xpm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd4"></a>  <li id="httpd4">
 <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
Line 166 
Line 166 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="bridge"></a>  <li id="bridge">
 <font color="#009000"><strong>028: RELIABILITY FIX: August 26, 2004</strong></font>  <font color="#009000"><strong>028: RELIABILITY FIX: August 26, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
Line 178 
Line 178 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="icmp"></a>  <li id="icmp">
 <font color="#009000"><strong>027: RELIABILITY FIX: August 25, 2004</strong></font>  <font color="#009000"><strong>027: RELIABILITY FIX: August 25, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Improved verification of ICMP errors in order to minimize the impact of ICMP attacks  Improved verification of ICMP errors in order to minimize the impact of ICMP attacks
Line 189 
Line 189 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/027_icmp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/027_icmp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li id="rnd">
 <font color="#009000"><strong>026: RELIABILITY FIX: Jul 25, 2004</strong></font>  <font color="#009000"><strong>026: RELIABILITY FIX: Jul 25, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under a certain network load the kernel can run out of stack space.  This was  Under a certain network load the kernel can run out of stack space.  This was
Line 199 
Line 199 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/026_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/026_rnd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd3"></a>  <li id="httpd3">
 <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
Line 213 
Line 213 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/025_httpd3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/025_httpd3.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd3"></a>  <li id="isakmpd3">
 <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
Line 226 
Line 226 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/024_isakmpd3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/024_isakmpd3.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs3"></a>  <li id="cvs3">
 <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
Line 237 
Line 237 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/023_cvs3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/023_cvs3.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li id="kerberos">
 <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font>  <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
Line 252 
Line 252 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs2"></a>  <li id="cvs2">
 <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
Line 264 
Line 264 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/021_cvs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/021_cvs2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="procfs"></a>  <li id="procfs">
 <font color="#009000"><strong>020: SECURITY FIX: May 13, 2004</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: May 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
Line 272 
Line 272 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp2"></a>  <li id="tcp2">
 <font color="#009000"><strong>019: RELIABILITY FIX: May 6, 2004</strong></font>  <font color="#009000"><strong>019: RELIABILITY FIX: May 6, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
Line 280 
Line 280 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/019_tcp2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/019_tcp2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="gdt"></a>  <li id="gdt">
 <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
Line 290 
Line 290 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs"></a>  <li id="cvs">
 <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
Line 303 
Line 303 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/017_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/017_cvs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="openssl"></a>  <li id="openssl">
 <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
Line 314 
Line 314 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/016_openssl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/016_openssl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd2"></a>  <li id="isakmpd2">
 <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
Line 326 
Line 326 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/015_isakmpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li id="httpd2">
 <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
Line 337 
Line 337 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/014_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/014_httpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li id="tcp">
 <font color="#009000"><strong>013: RELIABILITY FIX: March 8, 2004</strong></font>  <font color="#009000"><strong>013: RELIABILITY FIX: March 8, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 OpenBSD's TCP/IP stack did not impose limits on how many out-of-order  OpenBSD's TCP/IP stack did not impose limits on how many out-of-order
Line 348 
Line 348 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/013_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/013_tcp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="font"></a>  <li id="font">
 <font color="#009000"><strong>012: RELIABILITY FIX: February 14, 2004</strong></font>  <font color="#009000"><strong>012: RELIABILITY FIX: February 14, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several buffer overflows exist in the code parsing  Several buffer overflows exist in the code parsing
Line 358 
Line 358 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/012_font.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/012_font.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ip6"></a>  <li id="ip6">
 <font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: February 8, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An IPv6 MTU handling problem exists that could be used by an attacker  An IPv6 MTU handling problem exists that could be used by an attacker
Line 368 
Line 368 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/011_ip6.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/011_ip6.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li id="sysvshm">
 <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A reference counting bug exists in the  A reference counting bug exists in the
Line 379 
Line 379 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/010_sysvshm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/010_sysvshm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several message handling flaws in  Several message handling flaws in
Line 391 
Line 391 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/009_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/009_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sem"></a>  <li id="sem">
 <font color="#009000"><strong>008: RELIABILITY FIX: November 20, 2003</strong></font>  <font color="#009000"><strong>008: RELIABILITY FIX: November 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An improper bounds check makes it possible for a local user to cause a crash  An improper bounds check makes it possible for a local user to cause a crash
Line 403 
Line 403 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="uvm"></a>  <li id="uvm">
 <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
Line 412 
Line 412 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ibcs2"></a>  <li id="ibcs2">
 <font color="#009000"><strong>006: SECURITY FIX: November 17, 2003</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: November 17, 2003</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 It may be possible for a local user to overrun the stack in  It may be possible for a local user to overrun the stack in
Line 425 
Line 425 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="exec"></a>  <li id="exec">
 <font color="#009000"><strong>005: RELIABILITY FIX: November 4, 2003</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: November 4, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.  It is possible for a local user to cause a system panic by executing a specially crafted binary with an invalid header.
Line 433 
Line 433 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>004: RELIABILITY FIX: November 1, 2003</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: November 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>  A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>
Line 445 
Line 445 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/004_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="arp"></a>  <li id="arp">
 <font color="#009000"><strong>003: RELIABILITY FIX: November 1, 2003</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: November 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a system panic by flooding it with spoofed ARP  It is possible for a local user to cause a system panic by flooding it with spoofed ARP
Line 453 
Line 453 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/003_arp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/003_arp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="asn1"></a>  <li id="asn1">
 <font color="#009000"><strong>002: SECURITY FIX: November 1, 2003</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: November 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The use of certain ASN.1 encodings or malformed public keys may allow an  The use of certain ASN.1 encodings or malformed public keys may allow an
Line 463 
Line 463 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cd_booklet"></a>  <li id="cd_booklet">
 <font color="#009000"><strong>001: DOCUMENTATION FIX: November 1, 2003</strong></font>  <font color="#009000"><strong>001: DOCUMENTATION FIX: November 1, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The CD insert documentation has an incorrect example for package installation.<br>  The CD insert documentation has an incorrect example for package installation.<br>

Legend:
Removed from v.1.65  
changed lines
  Added in v.1.66