===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata40.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -r1.40 -r1.41
--- www/errata40.html 2014/03/28 03:04:30 1.40
+++ www/errata40.html 2014/03/31 03:12:47 1.41
@@ -6,7 +6,6 @@
-
@@ -65,34 +64,18 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_4_0
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -100,7 +83,7 @@
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -110,28 +93,28 @@
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
015: SECURITY FIX: July 9, 2007 All Architectures
Fix possible heap overflow in file(1), aka CVE-2007-1536.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
014: STABILITY FIX: May 9, 2007 All Architectures
A malicious client can cause a division by zero.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
013: STABILITY FIX: April 26, 2007 PowerPC
An unhandled AltiVec assist exception can cause a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -140,7 +123,7 @@
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -157,7 +140,7 @@
CVE-2007-1667.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -171,7 +154,7 @@
Use "block in inet6" in /etc/pf.conf
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -188,7 +171,7 @@
the kernel to enter an infinite loop.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -203,7 +186,7 @@
kernels only.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -230,7 +213,7 @@
systems (m68k, m88k, and vax are a.out-based systems).
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -243,7 +226,7 @@
boot up.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -255,7 +238,7 @@
privilege escalation.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -273,7 +256,7 @@
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -286,7 +269,7 @@
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.