===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata40.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -c -r1.58 -r1.59
*** www/errata40.html 2016/08/15 02:22:06 1.58
--- www/errata40.html 2016/10/16 19:11:29 1.59
***************
*** 70,76 ****
--- 70,76 ----
***************
*** 92,98 ****
All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
!
A source code patch exists which remedies this problem.
--- 92,98 ----
All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
!
A source code patch exists which remedies this problem.
***************
*** 103,109 ****
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
!
A source code patch exists which remedies this problem.
--- 103,109 ----
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
!
A source code patch exists which remedies this problem.
***************
*** 111,117 ****
015: SECURITY FIX: July 9, 2007
All Architectures
Fix possible heap overflow in file(1), aka CVE-2007-1536.
!
A source code patch exists which remedies this problem.
--- 111,117 ----
015: SECURITY FIX: July 9, 2007
All Architectures
Fix possible heap overflow in file(1), aka CVE-2007-1536.
!
A source code patch exists which remedies this problem.
***************
*** 119,125 ****
014: STABILITY FIX: May 9, 2007
All Architectures
A malicious client can cause a division by zero.
!
A source code patch exists which remedies this problem.
--- 119,125 ----
014: STABILITY FIX: May 9, 2007
All Architectures
A malicious client can cause a division by zero.
!
A source code patch exists which remedies this problem.
***************
*** 127,133 ****
013: STABILITY FIX: April 26, 2007
PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
!
A source code patch exists which remedies this problem.
--- 127,133 ----
013: STABILITY FIX: April 26, 2007
PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 137,143 ****
IPv6 type 0 route headers can be used to mount a DoS attack against
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
!
A source code patch exists which remedies this problem.
--- 137,143 ----
IPv6 type 0 route headers can be used to mount a DoS attack against
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
!
A source code patch exists which remedies this problem.
***************
*** 155,161 ****
CVE-2007-1352,
CVE-2007-1667.
!
A source code patch exists which remedies this problem.
--- 155,161 ----
CVE-2007-1352,
CVE-2007-1667.
!
A source code patch exists which remedies this problem.
***************
*** 170,176 ****
can be installed.
Use "block in inet6" in /etc/pf.conf
!
A source code patch exists which remedies this problem.
--- 170,176 ----
can be installed.
Use "block in inet6" in /etc/pf.conf
!
A source code patch exists which remedies this problem.
***************
*** 179,185 ****
All architectures
A US daylight saving time rules change takes effect in 2007.
!
A source code patch exists which syncs the timezone data files with tzdata2007a.
--- 179,185 ----
All architectures
A US daylight saving time rules change takes effect in 2007.
!
A source code patch exists which syncs the timezone data files with tzdata2007a.
***************
*** 189,195 ****
Under some circumstances, processing an ICMP6 echo request would cause
the kernel to enter an infinite loop.
!
A source code patch exists which remedies this problem.
--- 189,195 ----
Under some circumstances, processing an ICMP6 echo request would cause
the kernel to enter an infinite loop.
!
A source code patch exists which remedies this problem.
***************
*** 204,210 ****
The PCIAGP option is present by default on i386
kernels only.
!
A source code patch exists which remedies this problem.
--- 204,210 ----
The PCIAGP option is present by default on i386
kernels only.
!
A source code patch exists which remedies this problem.
***************
*** 217,225 ****
them from a mirror.
The archives have been corrected. The correct MD5 of
!
ports.tar.gz is eff352b4382a7fb7ffce1e8b37e9eb56, and for
!
src.tar.gz it is b8d7a0dc6f3d27a5377a23d69c40688e.
--- 217,225 ----
them from a mirror.
The archives have been corrected. The correct MD5 of
!
ports.tar.gz is eff352b4382a7fb7ffce1e8b37e9eb56, and for
!
src.tar.gz it is b8d7a0dc6f3d27a5377a23d69c40688e.
***************
*** 233,239 ****
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
!
A source code patch exists which remedies this problem.
--- 233,239 ----
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
!
A source code patch exists which remedies this problem.
***************
*** 247,253 ****
volumes will not be properly marked as being clean and fsck will be run for the subsequent
boot up.
!
A source code patch exists which remedies this problem.
--- 247,253 ----
volumes will not be properly marked as being clean and fsck will be run for the subsequent
boot up.
!
A source code patch exists which remedies this problem.
***************
*** 260,266 ****
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
!
A source code patch exists which remedies this problem.
--- 260,266 ----
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
!
A source code patch exists which remedies this problem.
***************
*** 279,285 ****
CVE-2006-2940
!
A source code patch exists which remedies this problem.
--- 279,285 ----
CVE-2006-2940
!
A source code patch exists which remedies this problem.
***************
*** 293,299 ****
CVE-2006-3918
!
A source code patch exists which remedies this problem.
--- 293,299 ----
CVE-2006-3918
!
A source code patch exists which remedies this problem.