===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata47.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -c -r1.29 -r1.30
*** www/errata47.html 2014/03/28 03:04:30 1.29
--- www/errata47.html 2014/03/31 03:12:47 1.30
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 64,98 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_4_7
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
013: SECURITY FIX: February 16, 2011 Little-endian architectures
--- 63,80 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_4_7
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
013: SECURITY FIX: February 16, 2011 Little-endian architectures
***************
*** 102,108 ****
prefixes "10.1.1.1/30") are not affected.
! A source code patch exists which remedies this problem.
-
--- 84,90 ----
prefixes "10.1.1.1/30") are not affected.
! A source code patch exists which remedies this problem.
-
***************
*** 119,125 ****
in v2.3.3; this is newer than the version in ports.
! A source code patch exists which remedies this problem.
-
--- 101,107 ----
in v2.3.3; this is newer than the version in ports.
! A source code patch exists which remedies this problem.
-
***************
*** 129,135 ****
not seeing any of the RTM_DELETE messages.
! A source code patch exists which remedies this problem.
-
--- 111,117 ----
not seeing any of the RTM_DELETE messages.
! A source code patch exists which remedies this problem.
-
***************
*** 144,150 ****
! A source code patch exists which remedies this problem.
--- 126,132 ----
! A source code patch exists which remedies this problem.
***************
*** 155,161 ****
privileges are needed to add or modify pf rules.
! A source code patch exists which remedies this problem.
-
--- 137,143 ----
privileges are needed to add or modify pf rules.
! A source code patch exists which remedies this problem.
-
***************
*** 166,172 ****
and/or disable internal session caching are not affected.
! A source code patch exists which remedies this problem.
-
--- 148,154 ----
and/or disable internal session caching are not affected.
! A source code patch exists which remedies this problem.
-
***************
*** 175,181 ****
Clear the ITSDONE flag before issuing commands to the SCSI adapter. Fixes handling of retried SCSI commands.
! A source code patch exists which remedies this problem.
-
--- 157,163 ----
Clear the ITSDONE flag before issuing commands to the SCSI adapter. Fixes handling of retried SCSI commands.
! A source code patch exists which remedies this problem.
-
***************
*** 183,189 ****
Restore an unusual XS_SENSE semantic. Fixes dump(8)/restore(8) problems seen on certain tape drives.
! A source code patch exists which remedies this problem.
-
--- 165,171 ----
Restore an unusual XS_SENSE semantic. Fixes dump(8)/restore(8) problems seen on certain tape drives.
! A source code patch exists which remedies this problem.
-
***************
*** 191,204 ****
Incorrectly initialized state updates can cause pfsync update storms.
! A source code patch exists which remedies this problem.
-
004: SECURITY FIX: April 23, 2010 All architectures
The combination of pfsync and IPSEC may crash the kernel.
! A source code patch exists which remedies this problem.
-
--- 173,186 ----
Incorrectly initialized state updates can cause pfsync update storms.
! A source code patch exists which remedies this problem.
-
004: SECURITY FIX: April 23, 2010 All architectures
The combination of pfsync and IPSEC may crash the kernel.
! A source code patch exists which remedies this problem.
-
***************
*** 207,213 ****
an OpenSSL client or server to crash due to a read attempt at NULL.
! A source code patch exists which remedies this problem.
-
--- 189,195 ----
an OpenSSL client or server to crash due to a read attempt at NULL.
! A source code patch exists which remedies this problem.
-
***************
*** 221,227 ****
reached.
! A source code patch exists which remedies this problem.
-
--- 203,209 ----
reached.
! A source code patch exists which remedies this problem.
-
***************
*** 231,237 ****
lead to crashes.
! A source code patch exists which remedies this problem.
--- 213,219 ----
lead to crashes.
! A source code patch exists which remedies this problem.