=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata39.html,v retrieving revision 1.60 retrieving revision 1.61 diff -u -r1.60 -r1.61 --- www/errata39.html 2016/08/15 02:22:06 1.60 +++ www/errata39.html 2016/10/16 19:11:29 1.61 @@ -70,7 +70,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

@@ -91,7 +91,7 @@ 023: STABILITY FIX: April 26, 2007   PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -101,7 +101,7 @@ IPv6 type 0 route headers can be used to mount a DoS attack against hosts and networks. This is a design flaw in IPv6 and not a bug in OpenBSD.
- + A source code patch exists which remedies this problem.

@@ -119,7 +119,7 @@ CVE-2007-1352, CVE-2007-1667.
- + A source code patch exists which remedies this problem.

@@ -134,7 +134,7 @@ can be installed.
Use "block in inet6" in /etc/pf.conf
- + A source code patch exists which remedies this problem.

@@ -143,7 +143,7 @@   All architectures
A US daylight saving time rules change takes effect in 2007.
- + A source code patch exists which syncs the timezone data files with tzdata2007a.

@@ -153,7 +153,7 @@ Under some circumstances, processing an ICMP6 echo request would cause the kernel to enter an infinite loop.
- + A source code patch exists which remedies this problem.

@@ -168,7 +168,7 @@ The PCIAGP option is present by default on i386 kernels only.
- + A source code patch exists which remedies this problem.

@@ -181,7 +181,7 @@ problem in cases we have not found yet. This patch applies to all ELF-based systems (m68k, m88k, and vax are a.out-based systems).
- + A source code patch exists which remedies this problem.

@@ -197,7 +197,7 @@ CVE-2006-4924, CVE-2006-5051
- + A source code patch exists which remedies this problem.

@@ -210,7 +210,7 @@ Chris Evans. This could be exploited for DoS, limited kmem reads or local privilege escalation.
- + A source code patch exists which remedies this problem.

@@ -228,7 +228,7 @@ CVE-2006-4343, CVE-2006-2940
- + A source code patch exists which remedies this problem.

@@ -241,7 +241,7 @@ style attacks. CVE-2006-3918
- + A source code patch exists which remedies this problem.

@@ -253,7 +253,7 @@ valid PKCS#1 v1.5 signature. CVE-2006-4339
- + A source code patch exists which remedies this problem.

@@ -270,7 +270,7 @@ CVE-2006-4095 CVE-2006-4096
- + A source code patch exists which remedies this problem.

@@ -283,7 +283,7 @@ connection causing the kernel to panic. CVE-2006-4304
- + A source code patch exists which remedies this problem.

@@ -298,7 +298,7 @@ An attacker could reinject sniffed IPsec packets, which will be accepted without checking the replay counter.
- + A source code patch exists which remedies this problem.

@@ -308,7 +308,7 @@ It is possible to cause the kernel to panic when more than the default number of sempahores have been allocated.
- + A source code patch exists which remedies this problem.

@@ -322,7 +322,7 @@ to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option. CVE-2006-3122
- + A source code patch exists which remedies this problem.

@@ -333,7 +333,7 @@ with really long header lines could trigger a use-after-free bug causing sendmail to crash.
- + A source code patch exists which remedies this problem.

@@ -347,7 +347,7 @@ could be triggered remotely. The default install is not affected by the buffer overflow. CVE-2006-3747
- + A source code patch exists which remedies this problem.

@@ -361,7 +361,7 @@ delivered. However, mail messages in the queue may not be reattempted if a malformed MIME message exists.
- + A source code patch exists which remedies this problem.

@@ -373,7 +373,7 @@ Clients authorized to connect to the X server are able to crash it and to execute malicious code within the X server.
- + A source code patch exists which remedies this problem.

@@ -385,7 +385,7 @@ privileges of the user running sendmail, typically root. This is the second revision of this patch.
- + A source code patch exists which remedies this problem.