===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata44.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -r1.38 -r1.39
--- www/errata44.html 2014/03/28 03:04:30 1.38
+++ www/errata44.html 2014/03/31 03:12:47 1.39
@@ -6,7 +6,6 @@
-
@@ -64,35 +63,18 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_4_4
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
016: RELIABILITY FIX: October 28, 2009 All architectures
@@ -100,7 +82,7 @@
IP_IPCOMP_LEVEL will crash the system.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -108,7 +90,7 @@
XMM exceptions are not correctly handled resulting in a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -119,7 +101,7 @@
zone for which the server is master.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -139,7 +121,7 @@
nat/rdr ... inet6 proto { tcp udp icmp6 } ...
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -156,7 +138,7 @@
Checking During CMS verification" relates to code not enabled in OpenBSD.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -168,7 +150,7 @@
in the RunAs portion of the rule.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -177,7 +159,7 @@
the process to terminate because of the resulting corrupt path.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -189,7 +171,7 @@
In the worst case Internet connectivity could be lost.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -200,7 +182,7 @@
CVE-2009-0025.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -213,7 +195,7 @@
CVE-2008-5077.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -223,7 +205,7 @@
accepting DHCP offers.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -232,7 +214,7 @@
accessing an array out of its bounds, when physical memory is exhausted.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -244,7 +226,7 @@
HTTP session.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -254,7 +236,7 @@
if being received on a socket in the TIME_WAIT state.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -263,7 +245,7 @@
driver to panic under heavy load if the RX path runs out of mbufs.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -275,7 +257,7 @@
CVE-2008-2476.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.