===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata43.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -c -r1.39 -r1.40
*** www/errata43.html 2014/03/28 03:04:30 1.39
--- www/errata43.html 2014/03/31 03:12:47 1.40
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 64,98 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_4_3
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
--- 63,80 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_4_3
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
***************
*** 112,118 ****
nat/rdr ... inet6 proto { tcp udp icmp6 } ...
! A source code patch exists which remedies this problem.
-
--- 94,100 ----
nat/rdr ... inet6 proto { tcp udp icmp6 } ...
! A source code patch exists which remedies this problem.
-
***************
*** 129,135 ****
Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.
-
--- 111,117 ----
Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.
-
***************
*** 141,147 ****
in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.
-
--- 123,129 ----
in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.
-
***************
*** 150,156 ****
the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.
-
--- 132,138 ----
the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.
-
***************
*** 162,168 ****
In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.
-
--- 144,150 ----
In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.
-
***************
*** 173,179 ****
CVE-2009-0025.
! A source code patch exists which remedies this problem.
-
--- 155,161 ----
CVE-2009-0025.
! A source code patch exists which remedies this problem.
-
***************
*** 186,192 ****
CVE-2008-5077.
! A source code patch exists which remedies this problem.
-
--- 168,174 ----
CVE-2008-5077.
! A source code patch exists which remedies this problem.
-
***************
*** 198,204 ****
CVE-2008-2476.
! A source code patch exists which remedies this problem.
-
--- 180,186 ----
CVE-2008-2476.
! A source code patch exists which remedies this problem.
-
***************
*** 208,214 ****
enabled by default, this condition affects all systems.
! A source code patch exists which remedies this problem.
-
--- 190,196 ----
enabled by default, this condition affects all systems.
! A source code patch exists which remedies this problem.
-
***************
*** 219,225 ****
CVE-2008-1447.
! A source code patch exists which remedies this problem.
-
--- 201,207 ----
CVE-2008-1447.
! A source code patch exists which remedies this problem.
-
***************
*** 237,243 ****
CVE-2008-1377.
! A source code patch exists which remedies this problem.
-
--- 219,225 ----
CVE-2008-1377.
! A source code patch exists which remedies this problem.
-
***************
*** 246,252 ****
by refusing to listen on a port unless all address families bind
successfully.
! A source code patch exists which remedies this problem.
-
--- 228,234 ----
by refusing to listen on a port unless all address families bind
successfully.
! A source code patch exists which remedies this problem.
-
***************
*** 256,262 ****
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
! A source code patch exists which remedies this problem.
--- 238,244 ----
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
! A source code patch exists which remedies this problem.