=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata40.html,v retrieving revision 1.58 retrieving revision 1.59 diff -c -r1.58 -r1.59 *** www/errata40.html 2016/08/15 02:22:06 1.58 --- www/errata40.html 2016/10/16 19:11:29 1.59 *************** *** 70,76 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

--- 70,76 ----


! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

*************** *** 92,98 ****   All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
! A source code patch exists which remedies this problem.

--- 92,98 ----   All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
! A source code patch exists which remedies this problem.

*************** *** 103,109 **** A DHCP client that claimed to require a maximum message size less than the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
! A source code patch exists which remedies this problem.

--- 103,109 ---- A DHCP client that claimed to require a maximum message size less than the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
! A source code patch exists which remedies this problem.

*************** *** 111,117 **** 015: SECURITY FIX: July 9, 2007   All Architectures
Fix possible heap overflow in file(1), aka CVE-2007-1536.
! A source code patch exists which remedies this problem.

--- 111,117 ---- 015: SECURITY FIX: July 9, 2007   All Architectures
Fix possible heap overflow in file(1), aka CVE-2007-1536.
! A source code patch exists which remedies this problem.

*************** *** 119,125 **** 014: STABILITY FIX: May 9, 2007   All Architectures
A malicious client can cause a division by zero.
! A source code patch exists which remedies this problem.

--- 119,125 ---- 014: STABILITY FIX: May 9, 2007   All Architectures
A malicious client can cause a division by zero.
! A source code patch exists which remedies this problem.

*************** *** 127,133 **** 013: STABILITY FIX: April 26, 2007   PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
! A source code patch exists which remedies this problem.

--- 127,133 ---- 013: STABILITY FIX: April 26, 2007   PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
! A source code patch exists which remedies this problem.

*************** *** 137,143 **** IPv6 type 0 route headers can be used to mount a DoS attack against hosts and networks. This is a design flaw in IPv6 and not a bug in OpenBSD.
! A source code patch exists which remedies this problem.

--- 137,143 ---- IPv6 type 0 route headers can be used to mount a DoS attack against hosts and networks. This is a design flaw in IPv6 and not a bug in OpenBSD.
! A source code patch exists which remedies this problem.

*************** *** 155,161 **** CVE-2007-1352, CVE-2007-1667.
! A source code patch exists which remedies this problem.

--- 155,161 ---- CVE-2007-1352, CVE-2007-1667.
! A source code patch exists which remedies this problem.

*************** *** 170,176 **** can be installed.
Use "block in inet6" in /etc/pf.conf
! A source code patch exists which remedies this problem.

--- 170,176 ---- can be installed.
Use "block in inet6" in /etc/pf.conf
! A source code patch exists which remedies this problem.

*************** *** 179,185 ****   All architectures
A US daylight saving time rules change takes effect in 2007.
! A source code patch exists which syncs the timezone data files with tzdata2007a.

--- 179,185 ----   All architectures
A US daylight saving time rules change takes effect in 2007.
! A source code patch exists which syncs the timezone data files with tzdata2007a.

*************** *** 189,195 **** Under some circumstances, processing an ICMP6 echo request would cause the kernel to enter an infinite loop.
! A source code patch exists which remedies this problem.

--- 189,195 ---- Under some circumstances, processing an ICMP6 echo request would cause the kernel to enter an infinite loop.
! A source code patch exists which remedies this problem.

*************** *** 204,210 **** The PCIAGP option is present by default on i386 kernels only.
! A source code patch exists which remedies this problem.

--- 204,210 ---- The PCIAGP option is present by default on i386 kernels only.
! A source code patch exists which remedies this problem.

*************** *** 217,225 **** them from a mirror.
The archives have been corrected. The correct MD5 of ! ports.tar.gz is eff352b4382a7fb7ffce1e8b37e9eb56, and for ! src.tar.gz it is b8d7a0dc6f3d27a5377a23d69c40688e.

--- 217,225 ---- them from a mirror.
The archives have been corrected. The correct MD5 of ! ports.tar.gz is eff352b4382a7fb7ffce1e8b37e9eb56, and for ! src.tar.gz it is b8d7a0dc6f3d27a5377a23d69c40688e.

*************** *** 233,239 **** problem in cases we have not found yet. This patch applies to all ELF-based systems (m68k, m88k, and vax are a.out-based systems).
! A source code patch exists which remedies this problem.

--- 233,239 ---- problem in cases we have not found yet. This patch applies to all ELF-based systems (m68k, m88k, and vax are a.out-based systems).
! A source code patch exists which remedies this problem.

*************** *** 247,253 **** volumes will not be properly marked as being clean and fsck will be run for the subsequent boot up.
! A source code patch exists which remedies this problem.

--- 247,253 ---- volumes will not be properly marked as being clean and fsck will be run for the subsequent boot up.
! A source code patch exists which remedies this problem.

*************** *** 260,266 **** Chris Evans. This could be exploited for DoS, limited kmem reads or local privilege escalation.
! A source code patch exists which remedies this problem.

--- 260,266 ---- Chris Evans. This could be exploited for DoS, limited kmem reads or local privilege escalation.
! A source code patch exists which remedies this problem.

*************** *** 279,285 **** CVE-2006-2940
! A source code patch exists which remedies this problem.

--- 279,285 ---- CVE-2006-2940
! A source code patch exists which remedies this problem.

*************** *** 293,299 **** CVE-2006-3918
! A source code patch exists which remedies this problem.

--- 293,299 ---- CVE-2006-3918
! A source code patch exists which remedies this problem.