[BACK]Return to errata35.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata35.html between version 1.46 and 1.47

version 1.46, 2014/03/28 03:04:30 version 1.47, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 1997-2004 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 65 
Line 64 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_3_5</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_3_5</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <a name="all"></a>  <a name="all"></a>
Line 86 
Line 88 
 .  .
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/033_cvs4.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/033_cvs4.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="tcp2"></a>  <li><a name="tcp2"></a>
Line 96 
Line 98 
 timestamps.  timestamps.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="telnet"></a>  <li><a name="telnet"></a>
Line 109 
Line 111 
 .  .
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/031_telnet.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/031_telnet.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sack"></a>  <li><a name="sack"></a>
Line 120 
Line 122 
 invalid SACK options and cause a system crash.  invalid SACK options and cause a system crash.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/030_sack.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/030_sack.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
   
Line 133 
Line 135 
 timestamp option, an attacker can cause a system panic.  timestamp option, an attacker can cause a system panic.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/027_rtt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/027_rtt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd3"></a>  <li><a name="httpd3"></a>
Line 147 
Line 149 
 includes and making use of a malicious document.  includes and making use of a malicious document.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/026_httpd3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/026_httpd3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="getcwd"></a>  <li><a name="getcwd"></a>
Line 158 
Line 160 
 to retrieve the current working directory if the path is very long.  to retrieve the current working directory if the path is very long.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/025_getcwd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/025_getcwd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="pfkey"></a>  <li><a name="pfkey"></a>
Line 171 
Line 173 
 credentials on a socket.  credentials on a socket.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lynx"></a>  <li><a name="lynx"></a>
 <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 184 
Line 186 
 to exhaust memory and then crash when parsing such pages.  to exhaust memory and then crash when parsing such pages.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pppd"></a>  <li><a name="pppd"></a>
 <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 193 
Line 195 
 be used to deny service to other users.  be used to deny service to other users.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/022_pppd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/022_pppd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bind"></a>  <li><a name="bind"></a>
 <font color="#009000"><strong>021: RELIABILITY FIX: November 10, 2004</strong></font><br>  <font color="#009000"><strong>021: RELIABILITY FIX: November 10, 2004</strong></font><br>
Line 202 
Line 204 
 thus slow DNS queries.  thus slow DNS queries.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/021_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/021_bind.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="radius"></a>  <li><a name="radius"></a>
 <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font><br>  <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font><br>
Line 213 
Line 215 
 attacker.  Note that OpenBSD does not ship with radius authentication enabled.  attacker.  Note that OpenBSD does not ship with radius authentication enabled.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/020_radius.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/020_radius.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xpm"></a>  <li><a name="xpm"></a>
 <font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font><br>  <font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font><br>
Line 226 
Line 228 
 an application that handles XPM images, if they could escape ProPolice.  an application that handles XPM images, if they could escape ProPolice.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/019_xpm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/019_xpm.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li><a name="httpd2"></a>
 <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font><br>  <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font><br>
Line 237 
Line 239 
 dbm file.  dbm file.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/018_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/018_httpd2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="libz"></a>  <li><a name="libz"></a>
 <font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font><br>  <font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font><br>
Line 247 
Line 249 
 .  .
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/017_libz.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/017_libz.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bridge"></a>  <li><a name="bridge"></a>
 <font color="#009000"><strong>016: RELIABILITY FIX: August 26, 2004</strong></font><br>  <font color="#009000"><strong>016: RELIABILITY FIX: August 26, 2004</strong></font><br>
Line 258 
Line 260 
 with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.  with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="icmp"></a>  <li><a name="icmp"></a>
 <font color="#009000"><strong>015: RELIABILITY FIX: August 25, 2004</strong></font><br>  <font color="#009000"><strong>015: RELIABILITY FIX: August 25, 2004</strong></font><br>
Line 268 
Line 270 
 <a href="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</a>  <a href="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</a>
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/015_icmp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/015_icmp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li><a name="rnd"></a>
 <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font><br>  <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font><br>
Line 277 
Line 279 
 manifested itself as a FPU related crash on boot up.  manifested itself as a FPU related crash on boot up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li><a name="httpd"></a>
 <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font><br>  <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font><br>
Line 290 
Line 292 
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</a>.  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</a>.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/013_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/013_httpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font><br>  <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font><br>
Line 302 
Line 304 
 tunnels at will.  tunnels at will.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/012_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/012_isakmpd.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs3"></a>  <li><a name="cvs3"></a>
 <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font><br>  <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font><br>
Line 312 
Line 314 
 code with the same privileges as the CVS server program.  code with the same privileges as the CVS server program.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/011_cvs3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/011_cvs3.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fifofs"></a>  <li><a name="fifofs"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font><br>  <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font><br>
Line 322 
Line 324 
 mail server which could go into an infinite loop and consume all CPU.  mail server which could go into an infinite loop and consume all CPU.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/010_fifofs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/010_fifofs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li><a name="kerberos"></a>
 <font color="#00900"><strong>009: SECURITY FIX: May 30,  <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font><br>
 2004</strong></font><br>  A flaw in the Kerberos V
 A flaw in the Kerberos V <a  <ahref="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>
 href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>  
 server could result in the administrator of a Kerberos realm having  server could result in the administrator of a Kerberos realm having
 the ability to impersonate any principal in any other realm which  the ability to impersonate any principal in any other realm which
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
Line 336 
Line 337 
 more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">  more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">
 Heimdal's announcement</a>.  Heimdal's announcement</a>.
 <br>  <br>
 <a  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch">
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch">  A source code patch exists which remedies this problem.</a>
 A source code patch exists which remedies this problem</a>.<br>  
 <p>  <p>
 <li><a name="xdm"></a>  <li><a name="xdm"></a>
 <font color="#00900"><strong>008: SECURITY FIX: May 26,  <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font><br>
 2004</strong></font><br>  
 With the introduction of IPv6 code in  With the introduction of IPv6 code in
 <a  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xdm&amp;apropos=0&amp;sektion=0&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">xdm(1)</a>,
 href="http://www.openbsd.org/cgi-bin/man.cgi?query=xdm&amp;apropos=0&amp;sektion=0&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">xdm(1)</a>,  
 one test on the 'requestPort' resource was deleted by accident. This  one test on the 'requestPort' resource was deleted by accident. This
 makes xdm create the chooser socket even if xdmcp is disabled in  makes xdm create the chooser socket even if xdmcp is disabled in
 xdm-config, by setting requestPort to 0. See  xdm-config, by setting requestPort to 0. See
 <a href="http://bugs.xfree86.org/show_bug.cgi?id=1376">XFree86  <a href="http://bugs.xfree86.org/show_bug.cgi?id=1376">XFree86
 bugzilla</a> for details.  bugzilla</a> for details.
 <br>  <br>
 <a  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch">
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch">  A source code patch exists which remedies this problem.</a>
 A source code patch exists which remedies this problem</a>.<br>  
 <p>  <p>
 <li><a name="cvs2"></a>  <li><a name="cvs2"></a>
 <font color="#009000"><strong>007: SECURITY FIX: May 20,  <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font><br>
 2004</strong></font><br>  
 A heap overflow in the  A heap overflow in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server has been discovered that can be exploited by clients sending  server has been discovered that can be exploited by clients sending
Line 366 
Line 362 
 with the same privileges as the CVS server program.  with the same privileges as the CVS server program.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/007_cvs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/007_cvs2.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="procfs"></a>  <li><a name="procfs"></a>
 <font color="#009000"><strong>006: SECURITY FIX: May 13,  <font color="#009000"><strong>006: SECURITY FIX: May 13, 2004</strong></font><br>
 2004</strong></font><br>  
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li><a name="tcp"></a>
 <font color="#009000"><strong>005: RELIABILITY FIX: May 6,  <font color="#009000"><strong>005: RELIABILITY FIX: May 6, 2004</strong></font><br>
 2004</strong></font><br>  
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/005_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/005_tcp.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="scsi"></a>  <li><a name="scsi"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: May 5,  <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.  Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=siop&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">siop(4)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=siop&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">siop(4)</a>,
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=trm&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">trm(4)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=trm&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">trm(4)</a>,
Line 394 
Line 387 
 ).  ).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="gdt"></a>  <li><a name="gdt"></a>
 <font color="#009000"><strong>003: RELIABILITY FIX: May 5,  <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Under load "recent model"  Under load "recent model"
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>
 controllers will lock up.  controllers will lock up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs"></a>  <li><a name="cvs"></a>
 <font color="#009000"><strong>002: SECURITY FIX: May 5,  <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font><br>
 2004</strong></font><br>  
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,
 allowing malicious clients to create files outside the repository, allowing  allowing malicious clients to create files outside the repository, allowing
Line 417 
Line 408 
 repository.  repository.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
Line 431 
Line 422 
 functions to prevent their misuse.  functions to prevent their misuse.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/i386/028_locore.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/i386/028_locore.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name="alpha"></a>  
 <h3><font color="#e00000">alpha</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="amd64"></a>  <a name="amd64"></a>
 <h3><font color="#e00000">amd64</font></h3>  <h3><font color="#e00000">amd64</font></h3>
 <ul>  <ul>
Line 451 
Line 436 
 functions to prevent their misuse.  functions to prevent their misuse.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/amd64/029_copy.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/amd64/029_copy.patch">
 A source code patch exists which remedies this problem</a>.<br>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name="cats"></a>  
 <h3><font color="#e00000">cats</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mac68k"></a>  
 <h3><font color="#e00000">mac68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc"></a>  
 <h3><font color="#e00000">sparc</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="sparc64"></a>  
 <h3><font color="#e00000">sparc64</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hppa"></a>  
 <h3><font color="#e00000">hppa</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="hp300"></a>  
 <h3><font color="#e00000">hp300</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mvme68k"></a>  
 <h3><font color="#e00000">mvme68k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="mvme88k"></a>  
 <h3><font color="#e00000">mvme88k</font></h3>  
 <ul>  
 <li>No problems identified yet.  
 </ul>  
 <p>  
 <a name="macppc"></a>  <a name="macppc"></a>
 <h3><font color="#e00000">macppc</font></h3>  <h3><font color="#e00000">macppc</font></h3>
 <ul>  <ul>
Line 514 
Line 451 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
 <a name="vax"></a>  
 <h3><font color="#e00000">vax</font></h3>  
 <ul>  
 <li>No problems identified yet.  
   
 </ul>  </ul>
   

Legend:
Removed from v.1.46  
changed lines
  Added in v.1.47