[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.535 and 1.536

version 1.535, 2005/05/17 18:38:33 version 1.536, 2005/06/07 14:26:56
Line 55 
Line 55 
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
 <hr>  <hr>
   
 <li>  <!-- Temporarily put anchors for all archs here.  Remove later. -->
 There are no security patches for 3.7 at this time.  <a name="all"></a>
   <a name="alpha"></a>
   <a name="amd64"></a>
   <a name="cats"></a>
   <a name="hp300"></a>
   <a name="hppa"></a>
   <a name="i386"></a>
   <a name="mvme88k"></a>
   <a name="mac68k"></a>
   <a name="macppc"></a>
   <a name="mvme68k"></a>
   <a name="mvme88k"></a>
   <a name="sparc"></a>
   <a name="sparc64"></a>
   <a name="vax"></a>
   <ul>
   
   <li><a name="cvs"></a>
   <font color="#009000"><strong>001: SECURITY FIX: June 7, 2005</strong></font> &nbsp; <i>All architectures</i><br>
   
   Fix a buffer overflow, memory leaks, and NULL pointer dereference in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>
   . None of these issues are known to be exploitable.
   <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a>
   .
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/016_cvs.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
 </ul>  </ul>
   
 <br>  <br>

Legend:
Removed from v.1.535  
changed lines
  Added in v.1.536