===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -c -r1.38 -r1.39
*** www/errata44.html 2014/03/28 03:04:30 1.38
--- www/errata44.html 2014/03/31 03:12:47 1.39
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 64,98 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_4_4
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
016: RELIABILITY FIX: October 28, 2009 All architectures
--- 63,80 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_4_4
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
016: RELIABILITY FIX: October 28, 2009 All architectures
***************
*** 100,106 ****
IP_IPCOMP_LEVEL will crash the system.
! A source code patch exists which remedies this problem.
-
--- 82,88 ----
IP_IPCOMP_LEVEL will crash the system.
! A source code patch exists which remedies this problem.
-
***************
*** 108,114 ****
XMM exceptions are not correctly handled resulting in a kernel panic.
! A source code patch exists which remedies this problem.
-
--- 90,96 ----
XMM exceptions are not correctly handled resulting in a kernel panic.
! A source code patch exists which remedies this problem.
-
***************
*** 119,125 ****
zone for which the server is master.
! A source code patch exists which remedies this problem.
-
--- 101,107 ----
zone for which the server is master.
! A source code patch exists which remedies this problem.
-
***************
*** 139,145 ****
nat/rdr ... inet6 proto { tcp udp icmp6 } ...
! A source code patch exists which remedies this problem.
-
--- 121,127 ----
nat/rdr ... inet6 proto { tcp udp icmp6 } ...
! A source code patch exists which remedies this problem.
-
***************
*** 156,162 ****
Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.
-
--- 138,144 ----
Checking During CMS verification" relates to code not enabled in OpenBSD.
! A source code patch exists which remedies this problem.
-
***************
*** 168,174 ****
in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.
-
--- 150,156 ----
in the RunAs portion of the rule.
! A source code patch exists which remedies this problem.
-
***************
*** 177,183 ****
the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.
-
--- 159,165 ----
the process to terminate because of the resulting corrupt path.
! A source code patch exists which remedies this problem.
-
***************
*** 189,195 ****
In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.
-
--- 171,177 ----
In the worst case Internet connectivity could be lost.
! A source code patch exists which remedies this problem.
-
***************
*** 200,206 ****
CVE-2009-0025.
! A source code patch exists which remedies this problem.
-
--- 182,188 ----
CVE-2009-0025.
! A source code patch exists which remedies this problem.
-
***************
*** 213,219 ****
CVE-2008-5077.
! A source code patch exists which remedies this problem.
-
--- 195,201 ----
CVE-2008-5077.
! A source code patch exists which remedies this problem.
-
***************
*** 223,229 ****
accepting DHCP offers.
! A source code patch exists which remedies this problem.
-
--- 205,211 ----
accepting DHCP offers.
! A source code patch exists which remedies this problem.
-
***************
*** 232,238 ****
accessing an array out of its bounds, when physical memory is exhausted.
! A source code patch exists which remedies this problem.
-
--- 214,220 ----
accessing an array out of its bounds, when physical memory is exhausted.
! A source code patch exists which remedies this problem.
-
***************
*** 244,250 ****
HTTP session.
! A source code patch exists which remedies this problem.
-
--- 226,232 ----
HTTP session.
! A source code patch exists which remedies this problem.
-
***************
*** 254,260 ****
if being received on a socket in the TIME_WAIT state.
! A source code patch exists which remedies this problem.
-
--- 236,242 ----
if being received on a socket in the TIME_WAIT state.
! A source code patch exists which remedies this problem.
-
***************
*** 263,269 ****
driver to panic under heavy load if the RX path runs out of mbufs.
! A source code patch exists which remedies this problem.
-
--- 245,251 ----
driver to panic under heavy load if the RX path runs out of mbufs.
! A source code patch exists which remedies this problem.
-
***************
*** 275,281 ****
CVE-2008-2476.
! A source code patch exists which remedies this problem.
--- 257,263 ----
CVE-2008-2476.
! A source code patch exists which remedies this problem.