[BACK]Return to errata35.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata35.html between version 1.77 and 1.78

version 1.77, 2019/04/02 12:46:56 version 1.78, 2019/05/27 22:55:19
Line 1 
Line 1 
 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">  <!doctype html>
 <html>  <html lang=en id=errata>
 <head>  <meta charset=utf-8>
   
 <title>OpenBSD 3.5 Errata</title>  <title>OpenBSD 3.5 Errata</title>
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  
 <meta name="viewport" content="width=device-width, initial-scale=1">  <meta name="viewport" content="width=device-width, initial-scale=1">
 <link rel="stylesheet" type="text/css" href="openbsd.css">  <link rel="stylesheet" type="text/css" href="openbsd.css">
 <link rel="canonical" href="https://www.openbsd.org/errata35.html">  <link rel="canonical" href="https://www.openbsd.org/errata35.html">
 </head>  
   
 <!--  <!--
                         IMPORTANT REMINDER                          IMPORTANT REMINDER
         IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE          IF YOU ADD A NEW ERRATUM, MAIL THE PATCH TO TECH AND ANNOUNCE
 -->  -->
   
 <body bgcolor="#ffffff" text="#000000" link="#23238E">  
   
 <h2>  <h2 id=OpenBSD>
 <a href="index.html">  <a href="index.html">
 <font color="#0000ff"><i>Open</i></font><font color="#000084">BSD</font></a>  <i>Open</i><b>BSD</b></a>
 <font color="#e00000">3.5 Errata</font>  3.5 Errata
 </h2>  </h2>
 <hr>  <hr>
   
Line 87 
Line 85 
   
 <ul>  <ul>
 <li id="cvs4">  <li id="cvs4">
 <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>  <strong>033: SECURITY FIX: April 28, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
 <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>
Line 100 
Line 98 
 <p>  <p>
   
 <li id="tcp2">  <li id="tcp2">
 <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>  <strong>032: RELIABILITY FIX: April 4, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Handle an edge condition in  Handle an edge condition in
 <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>
Line 111 
Line 109 
 <p>  <p>
   
 <li id="telnet">  <li id="telnet">
 <font color="#009000"><strong>031: SECURITY FIX: March 30, 2005</strong></font>  <strong>031: SECURITY FIX: March 30, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to buffer overflows in  Due to buffer overflows in
 <a href="https://man.openbsd.org/OpenBSD-3.5/telnet.1">telnet(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/telnet.1">telnet(1)</a>
Line 125 
Line 123 
 <p>  <p>
   
 <li id="sack">  <li id="sack">
 <font color="#009000"><strong>030: RELIABILITY FIX: March 30, 2005</strong></font>  <strong>030: RELIABILITY FIX: March 30, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Bugs in the  Bugs in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>
Line 137 
Line 135 
 <p>  <p>
   
 <li id="copy">  <li id="copy">
 <font color="#009000"><strong>029: SECURITY FIX: March 16, 2005</strong></font>  <strong>029: SECURITY FIX: March 16, 2005</strong>
 &nbsp; <i>amd64 only</i><br>  &nbsp; <i>amd64 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/copy.9">copy(9)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/copy.9">copy(9)</a>
Line 148 
Line 146 
 <p>  <p>
   
 <li id="locore">  <li id="locore">
 <font color="#009000"><strong>028: SECURITY FIX: February 28, 2005</strong></font>  <strong>028: SECURITY FIX: February 28, 2005</strong>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 More stringent checking should be done in the  More stringent checking should be done in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/copy.9">copy(9)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/copy.9">copy(9)</a>
Line 159 
Line 157 
 <p>  <p>
   
 <li id="rtt">  <li id="rtt">
 <font color="#009000"><strong>027: RELIABILITY FIX: January 11, 2005</strong></font>  <strong>027: RELIABILITY FIX: January 11, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A bug in the  A bug in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/tcp.4">tcp(4)</a>
Line 172 
Line 170 
 <p>  <p>
   
 <li id="httpd3">  <li id="httpd3">
 <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>  <strong>026: SECURITY FIX: January 12, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>
 's mod_include module fails to properly validate the length of  's mod_include module fails to properly validate the length of
Line 187 
Line 185 
 <p>  <p>
   
 <li id="getcwd">  <li id="getcwd">
 <font color="#009000"><strong>025: RELIABILITY FIX: January 6, 2005</strong></font>  <strong>025: RELIABILITY FIX: January 6, 2005</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The  The
 <a href="https://man.openbsd.org/OpenBSD-3.5/getcwd.3">getcwd(3)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/getcwd.3">getcwd(3)</a>
Line 199 
Line 197 
 <p>  <p>
   
 <li id="pfkey">  <li id="pfkey">
 <font color="#009000"><strong>024: SECURITY FIX: December 14, 2004</strong></font>  <strong>024: SECURITY FIX: December 14, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
 <a href="https://man.openbsd.org/OpenBSD-3.5/isakmpd.8">isakmpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/isakmpd.8">isakmpd(8)</a>
Line 212 
Line 210 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="lynx">  <li id="lynx">
 <font color="#009000"><strong>023: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>023: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
 <a href="https://man.openbsd.org/OpenBSD-3.5/lynx.1">lynx(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/lynx.1">lynx(1)</a>
Line 226 
Line 224 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="pppd">  <li id="pppd">
 <font color="#009000"><strong>022: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>022: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.5/pppd.8">pppd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/pppd.8">pppd(8)</a>
 contains a bug that allows an attacker to crash his own connection, but it cannot  contains a bug that allows an attacker to crash his own connection, but it cannot
Line 236 
Line 234 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="bind">  <li id="bind">
 <font color="#009000"><strong>021: RELIABILITY FIX: November 10, 2004</strong></font>  <strong>021: RELIABILITY FIX: November 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in  BIND contains a bug which results in BIND trying to contact nameservers via IPv6, even in
 cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and  cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and
Line 246 
Line 244 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="radius">  <li id="radius">
 <font color="#009000"><strong>020: SECURITY FIX: September 20, 2004</strong></font>  <strong>020: SECURITY FIX: September 20, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
 <a href="https://man.openbsd.org/OpenBSD-3.5/login_radius.8">login_radius(8)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.5/login_radius.8">login_radius(8)</a>,
Line 258 
Line 256 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xpm">  <li id="xpm">
 <font color="#009000"><strong>019: SECURITY FIX: September 16, 2004</strong></font>  <strong>019: SECURITY FIX: September 16, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Chris Evans reported several flaws (stack and integer overflows) in the  Chris Evans reported several flaws (stack and integer overflows) in the
 <a href="http://www.inria.fr/koala/lehors/xpm.html">Xpm</a>  <a href="http://www.inria.fr/koala/lehors/xpm.html">Xpm</a>
Line 272 
Line 270 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd2">  <li id="httpd2">
 <font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font>  <strong>018: SECURITY FIX: September 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>
 's mod_rewrite module can be made to write one zero byte in an arbitrary memory  's mod_rewrite module can be made to write one zero byte in an arbitrary memory
Line 284 
Line 282 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="libz">  <li id="libz">
 <font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font>  <strong>017: RELIABILITY FIX: August 29, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to incorrect error handling in zlib an attacker could potentially cause a Denial  Due to incorrect error handling in zlib an attacker could potentially cause a Denial
 of Service attack.  of Service attack.
Line 295 
Line 293 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="bridge">  <li id="bridge">
 <font color="#009000"><strong>016: RELIABILITY FIX: August 26, 2004</strong></font>  <strong>016: RELIABILITY FIX: August 26, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
 <a href="https://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>  <a href="https://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>
Line 307 
Line 305 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="icmp">  <li id="icmp">
 <font color="#009000"><strong>015: RELIABILITY FIX: August 25, 2004</strong></font>  <strong>015: RELIABILITY FIX: August 25, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Improved verification of ICMP errors in order to minimize the impact of ICMP attacks  Improved verification of ICMP errors in order to minimize the impact of ICMP attacks
 against TCP.  against TCP.
Line 318 
Line 316 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="rnd">  <li id="rnd">
 <font color="#009000"><strong>014: RELIABILITY FIX: July 25, 2004</strong></font>  <strong>014: RELIABILITY FIX: July 25, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under a certain network load the kernel can run out of stack space.  This was  Under a certain network load the kernel can run out of stack space.  This was
 encountered in an environment using CARP on a VLAN interface.  This issue initially  encountered in an environment using CARP on a VLAN interface.  This issue initially
Line 328 
Line 326 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="httpd">  <li id="httpd">
 <font color="#009000"><strong>013: SECURITY FIX: June 12, 2004</strong></font>  <strong>013: SECURITY FIX: June 12, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
 <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/httpd.8">httpd(8)</a>
Line 342 
Line 340 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="isakmpd">  <li id="isakmpd">
 <font color="#009000"><strong>012: SECURITY FIX: June 10, 2004</strong></font>  <strong>012: SECURITY FIX: June 10, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
Line 355 
Line 353 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs3">  <li id="cvs3">
 <font color="#009000"><strong>011: SECURITY FIX: June 9, 2004</strong></font>  <strong>011: SECURITY FIX: June 9, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>
Line 366 
Line 364 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="fifofs">  <li id="fifofs">
 <font color="#009000"><strong>010: RELIABILITY FIX: June 9, 2004</strong></font>  <strong>010: RELIABILITY FIX: June 9, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in  A FIFO bug was introduced in OpenBSD 3.5 that occurs when a FIFO is opened in
 non-blocking mode for writing when there are no processes reading the FIFO.  non-blocking mode for writing when there are no processes reading the FIFO.
Line 377 
Line 375 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="kerberos">  <li id="kerberos">
 <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>  <strong>009: SECURITY FIX: May 30, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
 <a href="https://man.openbsd.org/OpenBSD-3.5/kdc">kdc(8)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/kdc">kdc(8)</a>
Line 392 
Line 390 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="xdm">  <li id="xdm">
 <font color="#00900"><strong>008: SECURITY FIX: May 26, 2004</strong></font>  <strong>008: SECURITY FIX: May 26, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 With the introduction of IPv6 code in  With the introduction of IPv6 code in
 <a href="https://man.openbsd.org/OpenBSD-3.5/xdm.1">xdm(1)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.5/xdm.1">xdm(1)</a>,
Line 406 
Line 404 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs2">  <li id="cvs2">
 <font color="#009000"><strong>007: SECURITY FIX: May 20, 2004</strong></font>  <strong>007: SECURITY FIX: May 20, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
 <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>
Line 418 
Line 416 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="procfs">  <li id="procfs">
 <font color="#009000"><strong>006: SECURITY FIX: May 13, 2004</strong></font>  <strong>006: SECURITY FIX: May 13, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Check for integer overflow in procfs.  Use of procfs is not recommended.  Check for integer overflow in procfs.  Use of procfs is not recommended.
 <br>  <br>
Line 426 
Line 424 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="tcp">  <li id="tcp">
 <font color="#009000"><strong>005: RELIABILITY FIX: May 6, 2004</strong></font>  <strong>005: RELIABILITY FIX: May 6, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Reply to in-window SYN with a rate-limited ACK.  Reply to in-window SYN with a rate-limited ACK.
 <br>  <br>
Line 434 
Line 432 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="scsi">  <li id="scsi">
 <font color="#009000"><strong>004: RELIABILITY FIX: May 5, 2004</strong></font>  <strong>004: RELIABILITY FIX: May 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.  Restore the ability to negotiate tags/wide/sync with some SCSI controllers ( i.e.
 <a href="https://man.openbsd.org/OpenBSD-3.5/siop.4">siop(4)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.5/siop.4">siop(4)</a>,
Line 446 
Line 444 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="gdt">  <li id="gdt">
 <font color="#009000"><strong>003: RELIABILITY FIX: May 5, 2004</strong></font>  <strong>003: RELIABILITY FIX: May 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
 <a href="https://man.openbsd.org/OpenBSD-3.5/gdt.4">gdt(4)</a>  <a href="https://man.openbsd.org/OpenBSD-3.5/gdt.4">gdt(4)</a>
Line 456 
Line 454 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="cvs">  <li id="cvs">
 <font color="#009000"><strong>002: SECURITY FIX: May 5, 2004</strong></font>  <strong>002: SECURITY FIX: May 5, 2004</strong>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>,  <a href="https://man.openbsd.org/OpenBSD-3.5/cvs.1">cvs(1)</a>,
Line 469 
Line 467 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li id="autobook_package">  <li id="autobook_package">
 <font color="#009000"><strong>001: BROKEN PACKAGE ON CD: May 4, 2004</strong></font>&nbsp; <i>macppc only</i><br>  <strong>001: BROKEN PACKAGE ON CD: May 4, 2004</strong>&nbsp; <i>macppc only</i><br>
 The powerpc autobook-1.3.tgz package found on CD2 has been found to be corrupt,  The powerpc autobook-1.3.tgz package found on CD2 has been found to be corrupt,
 and will not extract.  and will not extract.
 A replacement package can be found on the ftp sites.  A replacement package can be found on the ftp sites.
Line 478 
Line 476 
 </ul>  </ul>
   
 <hr>  <hr>
   
 </body>  
 </html>  

Legend:
Removed from v.1.77  
changed lines
  Added in v.1.78