=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata43.html,v retrieving revision 1.27 retrieving revision 1.28 diff -u -r1.27 -r1.28 --- www/errata43.html 2010/03/08 21:53:37 1.27 +++ www/errata43.html 2010/07/08 19:00:07 1.28 @@ -54,7 +54,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. @@ -104,7 +104,7 @@
     nat/rdr ... inet6 proto { tcp udp icmp6 } ...
 
- + A source code patch exists which remedies this problem.

@@ -121,7 +121,7 @@ OpenSSL security advisory, but note that the other issue described there "Incorrect Error Checking During CMS verification" relates to code not enabled in OpenBSD.
- + A source code patch exists which remedies this problem.

@@ -133,7 +133,7 @@ when the user being granted privileges is also a member of the group in the RunAs portion of the rule.
- + A source code patch exists which remedies this problem.

@@ -142,7 +142,7 @@ bgpd(8) did not correctly prepend its own AS to very long AS paths, causing the process to terminate because of the resulting corrupt path.
- + A source code patch exists which remedies this problem.

@@ -154,7 +154,7 @@ sessions. In the worst case Internet connectivity could be lost.
- + A source code patch exists which remedies this problem.

@@ -165,7 +165,7 @@ signatures. CVE-2009-0025.
- + A source code patch exists which remedies this problem.

@@ -178,7 +178,7 @@ certificate. CVE-2008-5077.
- + A source code patch exists which remedies this problem.

@@ -190,7 +190,7 @@ this vulnerability to be exploited. CVE-2008-2476.
- + A source code patch exists which remedies this problem.

@@ -200,7 +200,7 @@ was exercised by the named(8) patch for port randomization). Since INET6 is enabled by default, this condition affects all systems.
- + A source code patch exists which remedies this problem.

@@ -211,7 +211,7 @@ to poison the cache of a recursive resolving name server. CVE-2008-1447.
- + A source code patch exists which remedies this problem.

@@ -229,7 +229,7 @@ CVE-2008-1379, CVE-2008-1377.
- + A source code patch exists which remedies this problem.

@@ -238,7 +238,7 @@ Avoid possible hijacking of X11-forwarded connections with sshd(8) by refusing to listen on a port unless all address families bind successfully.
- + A source code patch exists which remedies this problem.

@@ -248,7 +248,7 @@ directive was in effect, allowing users with write access to this file to execute arbitrary commands. This behaviour was documented, but was an unsafe default and an extra hassle for administrators.
- + A source code patch exists which remedies this problem.

@@ -291,7 +291,7 @@


OpenBSD www@openbsd.org -
$OpenBSD: errata43.html,v 1.27 2010/03/08 21:53:37 deraadt Exp $ +
$OpenBSD: errata43.html,v 1.28 2010/07/08 19:00:07 sthen Exp $