===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata42.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -r1.42 -r1.43
--- www/errata42.html 2014/03/28 03:04:30 1.42
+++ www/errata42.html 2014/03/31 03:12:47 1.43
@@ -6,7 +6,6 @@
-
@@ -64,35 +63,18 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_4_2
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -104,7 +86,7 @@
CVE-2008-2476.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -114,7 +96,7 @@
enabled by default, this condition affects all systems.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -125,7 +107,7 @@
CVE-2008-1447.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -143,7 +125,7 @@
CVE-2008-1377.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -152,7 +134,7 @@
by refusing to listen on a port unless all address families bind
successfully.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -162,28 +144,28 @@
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
009: SECURITY FIX: March 7, 2008 All architectures
Buffer overflow in ppp command prompt parsing.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
008: RELIABILITY FIX: February 25, 2008 All architectures
Malformed IPv6 routing headers can cause a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
007: RELIABILITY FIX: February 22, 2008 All architectures
Incorrect assumptions in tcp_respond can lead to a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -204,21 +186,21 @@
CVE-2008-0006.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
005: RELIABILITY FIX: January 11, 2008 All architectures
A missing NULL pointer check can lead to a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: November 27, 2007 All architectures
A memory leak in pf can lead to machine lockups.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -245,7 +227,7 @@
002: SECURITY FIX: October 10, 2007 All architectures
The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -255,7 +237,7 @@
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.