===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata39.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -c -r1.42 -r1.43
*** www/errata39.html 2014/03/28 03:04:30 1.42
--- www/errata39.html 2014/03/31 03:12:47 1.43
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 65,104 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_3_9
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
023: STABILITY FIX: April 26, 2007 PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
! A source code patch exists which remedies this problem.
-
--- 64,88 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_3_9
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
023: STABILITY FIX: April 26, 2007 PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
! A source code patch exists which remedies this problem.
-
***************
*** 107,113 ****
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
! A source code patch exists which remedies this problem.
-
--- 91,97 ----
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
! A source code patch exists which remedies this problem.
-
***************
*** 124,130 ****
CVE-2007-1667.
! A source code patch exists which remedies this problem.
-
--- 108,114 ----
CVE-2007-1667.
! A source code patch exists which remedies this problem.
-
***************
*** 138,144 ****
Use "block in inet6" in /etc/pf.conf
! A source code patch exists which remedies this problem.
-
--- 122,128 ----
Use "block in inet6" in /etc/pf.conf
! A source code patch exists which remedies this problem.
-
***************
*** 155,161 ****
the kernel to enter an infinite loop.
! A source code patch exists which remedies this problem.
-
--- 139,145 ----
the kernel to enter an infinite loop.
! A source code patch exists which remedies this problem.
-
***************
*** 170,176 ****
kernels only.
! A source code patch exists which remedies this problem.
-
--- 154,160 ----
kernels only.
! A source code patch exists which remedies this problem.
-
***************
*** 182,188 ****
systems (m68k, m88k, and vax are a.out-based systems).
! A source code patch exists which remedies this problem.
-
--- 166,172 ----
systems (m68k, m88k, and vax are a.out-based systems).
! A source code patch exists which remedies this problem.
-
***************
*** 197,203 ****
CVE-2006-5051
! A source code patch exists which remedies this problem.
-
--- 181,187 ----
CVE-2006-5051
! A source code patch exists which remedies this problem.
-
***************
*** 209,215 ****
privilege escalation.
! A source code patch exists which remedies this problem.
-
--- 193,199 ----
privilege escalation.
! A source code patch exists which remedies this problem.
-
***************
*** 226,232 ****
CVE-2006-2940
! A source code patch exists which remedies this problem.
-
--- 210,216 ----
CVE-2006-2940
! A source code patch exists which remedies this problem.
-
***************
*** 238,244 ****
CVE-2006-3918
! A source code patch exists which remedies this problem.
-
--- 222,228 ----
CVE-2006-3918
! A source code patch exists which remedies this problem.
-
***************
*** 249,255 ****
CVE-2006-4339
! A source code patch exists which remedies this problem.
-
--- 233,239 ----
CVE-2006-4339
! A source code patch exists which remedies this problem.
-
***************
*** 265,271 ****
CVE-2006-4096
! A source code patch exists which remedies this problem.
-
--- 249,255 ----
CVE-2006-4096
! A source code patch exists which remedies this problem.
-
***************
*** 277,283 ****
CVE-2006-4304
! A source code patch exists which remedies this problem.
-
--- 261,267 ----
CVE-2006-4304
! A source code patch exists which remedies this problem.
-
***************
*** 291,297 ****
replay counter.
! A source code patch exists which remedies this problem.
-
--- 275,281 ----
replay counter.
! A source code patch exists which remedies this problem.
-
***************
*** 300,306 ****
sempahores have been allocated.
! A source code patch exists which remedies this problem.
-
--- 284,290 ----
sempahores have been allocated.
! A source code patch exists which remedies this problem.
-
***************
*** 313,319 ****
CVE-2006-3122
! A source code patch exists which remedies this problem.
-
--- 297,303 ----
CVE-2006-3122
! A source code patch exists which remedies this problem.
-
***************
*** 323,329 ****
sendmail to crash.
! A source code patch exists which remedies this problem.
-
--- 307,313 ----
sendmail to crash.
! A source code patch exists which remedies this problem.
-
***************
*** 336,342 ****
buffer overflow. CVE-2006-3747
! A source code patch exists which remedies this problem.
-
--- 320,326 ----
buffer overflow. CVE-2006-3747
! A source code patch exists which remedies this problem.
-
***************
*** 349,355 ****
malformed MIME message exists.
! A source code patch exists which remedies this problem.
-
--- 333,339 ----
malformed MIME message exists.
! A source code patch exists which remedies this problem.
-
***************
*** 360,366 ****
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
--- 344,350 ----
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
***************
*** 371,377 ****
this patch.
! A source code patch exists which remedies this problem.
--- 355,361 ----
this patch.
! A source code patch exists which remedies this problem.