[BACK]Return to errata35.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata35.html between version 1.53 and 1.54

version 1.53, 2014/10/02 14:34:45 version 1.54, 2015/02/14 04:36:51
Line 82 
Line 82 
 <hr>  <hr>
   
 <ul>  <ul>
 <li><a name="cvs4"></a>  <li id="cvs4">
 <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
Line 95 
Line 95 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="tcp2"></a>  <li id="tcp2">
 <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>  <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Handle an edge condition in  Handle an edge condition in
Line 106 
Line 106 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="telnet"></a>  <li id="telnet">
 <font color="#009000"><strong>031: SECURITY FIX: March 30, 2005</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: March 30, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to buffer overflows in  Due to buffer overflows in
Line 120 
Line 120 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="sack"></a>  <li id="sack">
 <font color="#009000"><strong>030: RELIABILITY FIX: March 30, 2005</strong></font>  <font color="#009000"><strong>030: RELIABILITY FIX: March 30, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs in the  Bugs in the
Line 132 
Line 132 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="copy"></a>  <li id="copy">
 <font color="#009000"><strong>029: SECURITY FIX: March 16, 2005</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: March 16, 2005</strong></font>
 &nbsp; <i>amd64 only</i><br>  &nbsp; <i>amd64 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
Line 143 
Line 143 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="locore"></a>  <li id="locore">
 <font color="#009000"><strong>028: SECURITY FIX: February 28, 2005</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: February 28, 2005</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
Line 154 
Line 154 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="rtt"></a>  <li id="rtt">
 <font color="#009000"><strong>027: RELIABILITY FIX: January 11, 2005</strong></font>  <font color="#009000"><strong>027: RELIABILITY FIX: January 11, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A bug in the  A bug in the
Line 167 
Line 167 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="httpd3"></a>  <li id="httpd3">
 <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
Line 182 
Line 182 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="getcwd"></a>  <li id="getcwd">
 <font color="#009000"><strong>025: RELIABILITY FIX: January 6, 2005</strong></font>  <font color="#009000"><strong>025: RELIABILITY FIX: January 6, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The  The
Line 194 
Line 194 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 <li><a name="pfkey"></a>  <li id="pfkey">
 <font color="#009000"><strong>024: SECURITY FIX: December 14, 2004</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: December 14, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
Line 207 
Line 207 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lynx"></a>  <li id="lynx">
 <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
Line 221 
Line 221 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="pppd"></a>  <li id="pppd">
 <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>
Line 231 
Line 231 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/022_pppd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/022_pppd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bind"></a>  <li id="bind">
 <font color="#009000"><strong>021: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>021: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in  BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in
Line 241 
Line 241 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/021_bind.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/021_bind.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="radius"></a>  <li id="radius">
 <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
Line 253 
Line 253 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/020_radius.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/020_radius.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xpm"></a>  <li id="xpm">
 <font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font>  <font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Chris Evans reported several flaws (stack and integer overflows) in the  Chris Evans reported several flaws (stack and integer overflows) in the
Line 267 
Line 267 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/019_xpm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/019_xpm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd2"></a>  <li id="httpd2">
 <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
Line 279 
Line 279 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/018_httpd2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/018_httpd2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="libz"></a>  <li id="libz">
 <font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font>  <font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect error handling in zlib an attacker could potentially cause a Denial  Due to incorrect error handling in zlib an attacker could potentially cause a Denial
Line 290 
Line 290 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/017_libz.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/017_libz.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="bridge"></a>  <li id="bridge">
 <font color="#009000"><strong>016: RELIABILITY FIX: August 26, 2004</strong></font>  <font color="#009000"><strong>016: RELIABILITY FIX: August 26, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
Line 302 
Line 302 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="icmp"></a>  <li id="icmp">
 <font color="#009000"><strong>015: RELIABILITY FIX: August 25, 2004</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: August 25, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Improved verification of ICMP errors in order to minimize the impact of ICMP attacks  Improved verification of ICMP errors in order to minimize the impact of ICMP attacks
Line 313 
Line 313 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/015_icmp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/015_icmp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li id="rnd">
 <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font>  <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under a certain network load the kernel can run out of stack space.  This was  Under a certain network load the kernel can run out of stack space.  This was
Line 323 
Line 323 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/014_rnd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="httpd"></a>  <li id="httpd">
 <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
Line 337 
Line 337 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/013_httpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/013_httpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li id="isakmpd">
 <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font>  <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
Line 350 
Line 350 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/012_isakmpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/012_isakmpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs3"></a>  <li id="cvs3">
 <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
Line 361 
Line 361 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/011_cvs3.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/011_cvs3.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fifofs"></a>  <li id="fifofs">
 <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font>  <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in  A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in
Line 372 
Line 372 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/010_fifofs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/010_fifofs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li id="kerberos">
 <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>  <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
Line 387 
Line 387 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xdm"></a>  <li id="xdm">
 <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font>  <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 With the introduction of IPv6 code in  With the introduction of IPv6 code in
Line 401 
Line 401 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/008_xdm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs2"></a>  <li id="cvs2">
 <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
Line 413 
Line 413 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/007_cvs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/007_cvs2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="procfs"></a>  <li id="procfs">
 <font color="#009000"><strong>006: SECURITY FIX: May 13, 2004</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: May 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
Line 421 
Line 421 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tcp"></a>  <li id="tcp">
 <font color="#009000"><strong>005: RELIABILITY FIX: May 6, 2004</strong></font>  <font color="#009000"><strong>005: RELIABILITY FIX: May 6, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
Line 429 
Line 429 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/005_tcp.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/005_tcp.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="scsi"></a>  <li id="scsi">
 <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.  Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.
Line 441 
Line 441 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="gdt"></a>  <li id="gdt">
 <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
Line 451 
Line 451 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="cvs"></a>  <li id="cvs">
 <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
Line 464 
Line 464 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="autobook_package"></a>  <li id="autobook_package">
 <font color="#009000"><strong>001: BROKEN PACKAGE ON CD: May 4, 2004</strong></font>&nbsp; <i>macppc only</i><br>  <font color="#009000"><strong>001: BROKEN PACKAGE ON CD: May 4, 2004</strong></font>&nbsp; <i>macppc only</i><br>
 The powerpc autobook-1.3.tgz package found on CD2 has been found to be corrupt,  The powerpc autobook-1.3.tgz package found on CD2 has been found to be corrupt,
 and will not extract.  and will not extract.

Legend:
Removed from v.1.53  
changed lines
  Added in v.1.54