=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata39.html,v retrieving revision 1.30 retrieving revision 1.31 diff -u -r1.30 -r1.31 --- www/errata39.html 2010/03/08 21:53:37 1.30 +++ www/errata39.html 2010/07/08 19:00:07 1.31 @@ -54,7 +54,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. @@ -89,7 +89,7 @@
  • 023: STABILITY FIX: April 26, 2007   PowerPC
    An unhandled AltiVec assist exception can cause a kernel panic.
    - + A source code patch exists which remedies this problem.

    @@ -98,7 +98,7 @@ IPv6 type 0 route headers can be used to mount a DoS attack against hosts and networks. This is a design flaw in IPv6 and not a bug in OpenBSD.
    - + A source code patch exists which remedies this problem.

    @@ -115,7 +115,7 @@ CVE-2007-1352, CVE-2007-1667.
    - + A source code patch exists which remedies this problem.

    @@ -129,7 +129,7 @@ can be installed.
    Use "block in inet6" in /etc/pf.conf
    - + A source code patch exists which remedies this problem.

    @@ -137,7 +137,7 @@ 019: INTEROPERABILITY FIX: February 4, 2007   All architectures
    A US daylight saving time rules change takes effect in 2007.
    - + A source code patch exists which syncs the timezone data files with tzdata2007a.

    @@ -146,7 +146,7 @@ Under some circumstances, processing an ICMP6 echo request would cause the kernel to enter an infinite loop.
    - + A source code patch exists which remedies this problem.

    @@ -161,7 +161,7 @@ The PCIAGP option is present by default on i386 kernels only.
    - + A source code patch exists which remedies this problem.

    @@ -173,7 +173,7 @@ problem in cases we have not found yet. This patch applies to all ELF-based systems (m68k, m88k, and vax are a.out-based systems).
    - + A source code patch exists which remedies this problem.

    @@ -188,7 +188,7 @@ CVE-2006-4924, CVE-2006-5051
    - + A source code patch exists which remedies this problem.

    @@ -200,7 +200,7 @@ Chris Evans. This could be exploited for DoS, limited kmem reads or local privilege escalation.
    - + A source code patch exists which remedies this problem.

    @@ -217,7 +217,7 @@ CVE-2006-4343, CVE-2006-2940
    - + A source code patch exists which remedies this problem.

    @@ -229,7 +229,7 @@ style attacks. CVE-2006-3918
    - + A source code patch exists which remedies this problem.

    @@ -240,7 +240,7 @@ valid PKCS#1 v1.5 signature. CVE-2006-4339
    - + A source code patch exists which remedies this problem.

    @@ -256,7 +256,7 @@ CVE-2006-4095 CVE-2006-4096
    - + A source code patch exists which remedies this problem.

    @@ -268,7 +268,7 @@ connection causing the kernel to panic. CVE-2006-4304
    - + A source code patch exists which remedies this problem.

    @@ -282,7 +282,7 @@ An attacker could reinject sniffed IPsec packets, which will be accepted without checking the replay counter.
    - + A source code patch exists which remedies this problem.

    @@ -291,7 +291,7 @@ It is possible to cause the kernel to panic when more than the default number of sempahores have been allocated.
    - + A source code patch exists which remedies this problem.

    @@ -304,7 +304,7 @@ to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. CVE-2006-3122
    - + A source code patch exists which remedies this problem.

    @@ -314,7 +314,7 @@ with really long header lines could trigger a use-after-free bug causing sendmail to crash.
    - + A source code patch exists which remedies this problem.

    @@ -327,7 +327,7 @@ could be triggered remotely. The default install is not affected by the buffer overflow. CVE-2006-3747
    - + A source code patch exists which remedies this problem.

    @@ -340,7 +340,7 @@ delivered. However, mail messages in the queue may not be reattempted if a malformed MIME message exists.
    - + A source code patch exists which remedies this problem.

    @@ -351,7 +351,7 @@ Clients authorized to connect to the X server are able to crash it and to execute malicious code within the X server.
    - + A source code patch exists which remedies this problem.

    @@ -362,7 +362,7 @@ privileges of the user running sendmail, typically root. This is the second revision of this patch.
    - + A source code patch exists which remedies this problem.

    @@ -406,7 +406,7 @@


    OpenBSD www@openbsd.org -
    $OpenBSD: errata39.html,v 1.30 2010/03/08 21:53:37 deraadt Exp $ +
    $OpenBSD: errata39.html,v 1.31 2010/07/08 19:00:07 sthen Exp $