===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata40.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -r1.28 -r1.29
--- www/errata40.html 2010/03/08 21:53:37 1.28
+++ www/errata40.html 2010/07/08 19:00:07 1.29
@@ -54,7 +54,7 @@
@@ -101,28 +101,28 @@
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
-
+
A source code patch exists which remedies this problem.
@@ -131,7 +131,7 @@
IPv6 type 0 route headers can be used to mount a DoS attack against
hosts and networks. This is a design flaw in IPv6 and not a bug in
OpenBSD.
-
+
A source code patch exists which remedies this problem.
@@ -148,7 +148,7 @@
CVE-2007-1352,
CVE-2007-1667.
-
+
A source code patch exists which remedies this problem.
@@ -162,7 +162,7 @@
can be installed.
Use "block in inet6" in /etc/pf.conf
-
+
A source code patch exists which remedies this problem.
@@ -170,7 +170,7 @@
009: INTEROPERABILITY FIX: February 4, 2007 All architectures
A US daylight saving time rules change takes effect in 2007.
-
+
A source code patch exists which syncs the timezone data files with tzdata2007a.
@@ -179,7 +179,7 @@
Under some circumstances, processing an ICMP6 echo request would cause
the kernel to enter an infinite loop.
-
+
A source code patch exists which remedies this problem.
@@ -194,7 +194,7 @@
The PCIAGP option is present by default on i386
kernels only.
-
+
A source code patch exists which remedies this problem.
@@ -206,9 +206,9 @@
them from a mirror.
The archives have been corrected. The correct MD5 of
-
+
ports.tar.gz is eff352b4382a7fb7ffce1e8b37e9eb56, and for
-
+
src.tar.gz it is b8d7a0dc6f3d27a5377a23d69c40688e.
@@ -221,7 +221,7 @@
problem in cases we have not found yet. This patch applies to all ELF-based
systems (m68k, m88k, and vax are a.out-based systems).
-
+
A source code patch exists which remedies this problem.
@@ -234,7 +234,7 @@
volumes will not be properly marked as being clean and fsck will be run for the subsequent
boot up.
-
+
A source code patch exists which remedies this problem.
@@ -246,7 +246,7 @@
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
-
+
A source code patch exists which remedies this problem.
@@ -264,7 +264,7 @@
CVE-2006-2940
-
+
A source code patch exists which remedies this problem.
@@ -277,7 +277,7 @@
CVE-2006-3918
-
+
A source code patch exists which remedies this problem.
@@ -321,7 +321,7 @@