===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata42.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -c -r1.42 -r1.43
*** www/errata42.html 2014/03/28 03:04:30 1.42
--- www/errata42.html 2014/03/31 03:12:47 1.43
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 64,98 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_4_2
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
--- 63,80 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_4_2
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
***************
*** 104,110 ****
CVE-2008-2476.
! A source code patch exists which remedies this problem.
-
--- 86,92 ----
CVE-2008-2476.
! A source code patch exists which remedies this problem.
-
***************
*** 114,120 ****
enabled by default, this condition affects all systems.
! A source code patch exists which remedies this problem.
-
--- 96,102 ----
enabled by default, this condition affects all systems.
! A source code patch exists which remedies this problem.
-
***************
*** 125,131 ****
CVE-2008-1447.
! A source code patch exists which remedies this problem.
-
--- 107,113 ----
CVE-2008-1447.
! A source code patch exists which remedies this problem.
-
***************
*** 143,149 ****
CVE-2008-1377.
! A source code patch exists which remedies this problem.
-
--- 125,131 ----
CVE-2008-1377.
! A source code patch exists which remedies this problem.
-
***************
*** 152,158 ****
by refusing to listen on a port unless all address families bind
successfully.
! A source code patch exists which remedies this problem.
-
--- 134,140 ----
by refusing to listen on a port unless all address families bind
successfully.
! A source code patch exists which remedies this problem.
-
***************
*** 162,189 ****
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
! A source code patch exists which remedies this problem.
-
009: SECURITY FIX: March 7, 2008 All architectures
Buffer overflow in ppp command prompt parsing.
! A source code patch exists which remedies this problem.
-
008: RELIABILITY FIX: February 25, 2008 All architectures
Malformed IPv6 routing headers can cause a kernel panic.
! A source code patch exists which remedies this problem.
-
007: RELIABILITY FIX: February 22, 2008 All architectures
Incorrect assumptions in tcp_respond can lead to a kernel panic.
! A source code patch exists which remedies this problem.
-
--- 144,171 ----
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
! A source code patch exists which remedies this problem.
-
009: SECURITY FIX: March 7, 2008 All architectures
Buffer overflow in ppp command prompt parsing.
! A source code patch exists which remedies this problem.
-
008: RELIABILITY FIX: February 25, 2008 All architectures
Malformed IPv6 routing headers can cause a kernel panic.
! A source code patch exists which remedies this problem.
-
007: RELIABILITY FIX: February 22, 2008 All architectures
Incorrect assumptions in tcp_respond can lead to a kernel panic.
! A source code patch exists which remedies this problem.
-
***************
*** 204,224 ****
CVE-2008-0006.
! A source code patch exists which remedies this problem.
-
005: RELIABILITY FIX: January 11, 2008 All architectures
A missing NULL pointer check can lead to a kernel panic.
! A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: November 27, 2007 All architectures
A memory leak in pf can lead to machine lockups.
! A source code patch exists which remedies this problem.
-
--- 186,206 ----
CVE-2008-0006.
! A source code patch exists which remedies this problem.
-
005: RELIABILITY FIX: January 11, 2008 All architectures
A missing NULL pointer check can lead to a kernel panic.
! A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: November 27, 2007 All architectures
A memory leak in pf can lead to machine lockups.
! A source code patch exists which remedies this problem.
-
***************
*** 245,251 ****
002: SECURITY FIX: October 10, 2007 All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
! A source code patch exists which remedies this problem.
-
--- 227,233 ----
002: SECURITY FIX: October 10, 2007 All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
! A source code patch exists which remedies this problem.
-
***************
*** 255,261 ****
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
! A source code patch exists which remedies this problem.
--- 237,243 ----
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
! A source code patch exists which remedies this problem.