[BACK]Return to errata35.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata35.html between version 1.60 and 1.61

version 1.60, 2016/02/20 14:18:42 version 1.61, 2016/03/21 05:46:20
Line 87 
Line 87 
 <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;sektion=1">cvs(1)</a>  <a href="http://man.openbsd.org?query=cvs&amp;sektion=1">cvs(1)</a>
 . None of these issues are known to be exploitable.  . None of these issues are known to be exploitable.
 <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a>  <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a>
 .  .
Line 100 
Line 100 
 <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>  <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Handle an edge condition in  Handle an edge condition in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&amp;sektion=4">tcp(4)</a>  <a href="http://man.openbsd.org?query=tcp&amp;sektion=4">tcp(4)</a>
 timestamps.  timestamps.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">
Line 111 
Line 111 
 <font color="#009000"><strong>031: SECURITY FIX: March 30, 2005</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: March 30, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to buffer overflows in  Due to buffer overflows in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=telnet&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">telnet(1)</a>  <a href="http://man.openbsd.org?query=telnet&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">telnet(1)</a>
 , a malicious server or man-in-the-middle attack could allow execution of  , a malicious server or man-in-the-middle attack could allow execution of
 arbitrary code with the privileges of the user invoking  arbitrary code with the privileges of the user invoking
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=telnet&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">telnet(1)</a>  <a href="http://man.openbsd.org?query=telnet&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">telnet(1)</a>
 .  .
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/031_telnet.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/031_telnet.patch">
Line 125 
Line 125 
 <font color="#009000"><strong>030: RELIABILITY FIX: March 30, 2005</strong></font>  <font color="#009000"><strong>030: RELIABILITY FIX: March 30, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs in the  Bugs in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">tcp(4)</a>  <a href="http://man.openbsd.org?query=tcp&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">tcp(4)</a>
 stack can lead to memory exhaustion or processing of TCP segments with  stack can lead to memory exhaustion or processing of TCP segments with
 invalid SACK options and cause a system crash.  invalid SACK options and cause a system crash.
 <br>  <br>
Line 137 
Line 137 
 <font color="#009000"><strong>029: SECURITY FIX: March 16, 2005</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: March 16, 2005</strong></font>
 &nbsp; <i>amd64 only</i><br>  &nbsp; <i>amd64 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&amp;apropos=0&amp;sektion=9&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">copy(9)</a>  <a href="http://man.openbsd.org?query=copy&amp;apropos=0&amp;sektion=9&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">copy(9)</a>
 functions to prevent their misuse.  functions to prevent their misuse.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/amd64/029_copy.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/amd64/029_copy.patch">
Line 148 
Line 148 
 <font color="#009000"><strong>028: SECURITY FIX: February 28, 2005</strong></font>  <font color="#009000"><strong>028: SECURITY FIX: February 28, 2005</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=copy&amp;apropos=0&amp;sektion=9&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">copy(9)</a>  <a href="http://man.openbsd.org?query=copy&amp;apropos=0&amp;sektion=9&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">copy(9)</a>
 functions to prevent their misuse.  functions to prevent their misuse.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/i386/028_locore.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/i386/028_locore.patch">
Line 159 
Line 159 
 <font color="#009000"><strong>027: RELIABILITY FIX: January 11, 2005</strong></font>  <font color="#009000"><strong>027: RELIABILITY FIX: January 11, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A bug in the  A bug in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">tcp(4)</a>  <a href="http://man.openbsd.org?query=tcp&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">tcp(4)</a>
 stack allows an invalid argument to be used in calculating the TCP  stack allows an invalid argument to be used in calculating the TCP
 retransmit timeout. By sending packets with specific values in the TCP  retransmit timeout. By sending packets with specific values in the TCP
 timestamp option, an attacker can cause a system panic.  timestamp option, an attacker can cause a system panic.
Line 171 
Line 171 
 <li id="httpd3">  <li id="httpd3">
 <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 's mod_include module fails to properly validate the length of  's mod_include module fails to properly validate the length of
 user supplied tag strings prior to copying them to a local buffer,  user supplied tag strings prior to copying them to a local buffer,
 causing a buffer overflow.  causing a buffer overflow.
Line 187 
Line 187 
 <font color="#009000"><strong>025: RELIABILITY FIX: January 6, 2005</strong></font>  <font color="#009000"><strong>025: RELIABILITY FIX: January 6, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The  The
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=getcwd&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">getcwd(3)</a>  <a href="http://man.openbsd.org?query=getcwd&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">getcwd(3)</a>
 library function contains a memory management error, which causes failure  library function contains a memory management error, which causes failure
 to retrieve the current working directory if the path is very long.  to retrieve the current working directory if the path is very long.
 <br>  <br>
Line 199 
Line 199 
 <font color="#009000"><strong>024: SECURITY FIX: December 14, 2004</strong></font>  <font color="#009000"><strong>024: SECURITY FIX: December 14, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 it is possible for a local user to cause kernel memory corruption  it is possible for a local user to cause kernel memory corruption
 and system panic by setting  and system panic by setting
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ipsec&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;format=html">ipsec(4)</a>  <a href="http://man.openbsd.org?query=ipsec&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;format=html">ipsec(4)</a>
 credentials on a socket.  credentials on a socket.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/024_pfkey.patch">
Line 212 
Line 212 
 <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>  <a href="http://man.openbsd.org?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>
 it is possible for pages such as  it is possible for pages such as
 <a href="http://lcamtuf.coredump.cx/mangleme/gallery/lynx_die1.html">this</a>  <a href="http://lcamtuf.coredump.cx/mangleme/gallery/lynx_die1.html">this</a>
 to cause  to cause
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>  <a href="http://man.openbsd.org?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>
 to exhaust memory and then crash when parsing such pages.  to exhaust memory and then crash when parsing such pages.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/023_lynx.patch">
Line 225 
Line 225 
 <li id="pppd">  <li id="pppd">
 <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>  <a href="http://man.openbsd.org?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>
 contains a bug that allows an attacker to crash his own connection, but it cannot  contains a bug that allows an attacker to crash his own connection, but it cannot
 be used to deny service to other users.  be used to deny service to other users.
 <br>  <br>
Line 246 
Line 246 
 <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font>  <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=login_radius&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">login_radius(8)</a>,  <a href="http://man.openbsd.org?query=login_radius&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">login_radius(8)</a>,
 was not checking the shared secret used for replies sent by the radius server.  was not checking the shared secret used for replies sent by the radius server.
 This could allow an attacker to spoof a reply granting access to the  This could allow an attacker to spoof a reply granting access to the
 attacker.  Note that OpenBSD does not ship with radius authentication enabled.  attacker.  Note that OpenBSD does not ship with radius authentication enabled.
Line 271 
Line 271 
 <li id="httpd2">  <li id="httpd2">
 <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font>  <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 's mod_rewrite module can be made to write one zero byte in an arbitrary memory  's mod_rewrite module can be made to write one zero byte in an arbitrary memory
 position outside of a char array, causing a DoS or possibly buffer overflows.  position outside of a char array, causing a DoS or possibly buffer overflows.
 This would require enabling dbm for mod_rewrite and making use of a malicious  This would require enabling dbm for mod_rewrite and making use of a malicious
Line 297 
Line 297 
 As  As
 <a href="http://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>  <a href="http://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>
 by Vafa Izadinia  by Vafa Izadinia
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">bridge(4)</a>  <a href="http://man.openbsd.org?query=bridge&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">bridge(4)</a>
 with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.  with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/016_bridge.patch">
Line 328 
Line 328 
 <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font>  <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 / mod_ssl.  / mod_ssl.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</a>,
Line 344 
Line 344 
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
 by Thomas Walpuski  by Thomas Walpuski
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 is still vulnerable to unauthorized SA deletion.  An attacker can delete IPsec  is still vulnerable to unauthorized SA deletion.  An attacker can delete IPsec
 tunnels at will.  tunnels at will.
 <br>  <br>
Line 355 
Line 355 
 <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font>  <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server that allow an attacker to crash the server or possibly execute arbitrary  server that allow an attacker to crash the server or possibly execute arbitrary
 code with the same privileges as the CVS server program.  code with the same privileges as the CVS server program.
 <br>  <br>
Line 377 
Line 377 
 <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>  <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>  <a href="http://man.openbsd.org?query=kdc">kdc(8)</a>
 server could result in the administrator of a Kerberos realm having  server could result in the administrator of a Kerberos realm having
 the ability to impersonate any principal in any other realm which  the ability to impersonate any principal in any other realm which
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
Line 392 
Line 392 
 <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font>  <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 With the introduction of IPv6 code in  With the introduction of IPv6 code in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=xdm&amp;apropos=0&amp;sektion=0&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">xdm(1)</a>,  <a href="http://man.openbsd.org?query=xdm&amp;apropos=0&amp;sektion=0&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">xdm(1)</a>,
 one test on the 'requestPort' resource was deleted by accident. This  one test on the 'requestPort' resource was deleted by accident. This
 makes xdm create the chooser socket even if xdmcp is disabled in  makes xdm create the chooser socket even if xdmcp is disabled in
 xdm-config, by setting requestPort to 0. See  xdm-config, by setting requestPort to 0. See
Line 406 
Line 406 
 <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font>  <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server has been discovered that can be exploited by clients sending  server has been discovered that can be exploited by clients sending
 malformed requests, enabling these clients to run arbitrary code  malformed requests, enabling these clients to run arbitrary code
 with the same privileges as the CVS server program.  with the same privileges as the CVS server program.
Line 434 
Line 434 
 <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.  Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=siop&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">siop(4)</a>,  <a href="http://man.openbsd.org?query=siop&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">siop(4)</a>,
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=trm&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">trm(4)</a>,  <a href="http://man.openbsd.org?query=trm&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">trm(4)</a>,
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=iha&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">iha(4)</a>  <a href="http://man.openbsd.org?query=iha&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">iha(4)</a>
 ).  ).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/004_scsi.patch">
Line 446 
Line 446 
 <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>  <a href="http://man.openbsd.org?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>
 controllers will lock up.  controllers will lock up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/003_gdt.patch">
Line 456 
Line 456 
 <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,
 allowing malicious clients to create files outside the repository, allowing  allowing malicious clients to create files outside the repository, allowing
 malicious servers to overwrite files outside the local CVS tree on  malicious servers to overwrite files outside the local CVS tree on
 the client and allowing clients to check out files outside the CVS  the client and allowing clients to check out files outside the CVS

Legend:
Removed from v.1.60  
changed lines
  Added in v.1.61