===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata36.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -c -r1.33 -r1.34
*** www/errata36.html 2014/03/28 03:04:30 1.33
--- www/errata36.html 2014/03/31 03:12:47 1.34
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 65,94 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_3_6
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
--- 64,81 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_3_6
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
***************
*** 99,105 ****
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.
-
--- 86,92 ----
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.
-
***************
*** 109,115 ****
which may be exploitable.
! A source code patch exists which remedies this problem.
-
--- 96,102 ----
which may be exploitable.
! A source code patch exists which remedies this problem.
-
***************
*** 121,127 ****
another user.
! A source code patch exists which remedies this problem.
-
--- 108,114 ----
another user.
! A source code patch exists which remedies this problem.
-
***************
*** 133,139 ****
credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.
-
--- 120,126 ----
credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.
-
***************
*** 145,151 ****
.
! A source code patch exists which remedies this problem.
-
--- 132,138 ----
.
! A source code patch exists which remedies this problem.
-
***************
*** 155,161 ****
timestamps.
! A source code patch exists which remedies this problem.
-
--- 142,148 ----
timestamps.
! A source code patch exists which remedies this problem.
-
***************
*** 169,175 ****
ssh(1).
! A source code patch exists which remedies this problem.
-
--- 156,162 ----
ssh(1).
! A source code patch exists which remedies this problem.
-
***************
*** 180,186 ****
invalid SACK options and cause a system crash.
! A source code patch exists which remedies this problem.
-
--- 167,173 ----
invalid SACK options and cause a system crash.
! A source code patch exists which remedies this problem.
-
***************
*** 190,196 ****
functions to prevent their misuse.
! A source code patch exists which remedies this problem.
-
--- 177,183 ----
functions to prevent their misuse.
! A source code patch exists which remedies this problem.
-
***************
*** 200,206 ****
functions to prevent their misuse.
! A source code patch exists which remedies this problem.
-
--- 187,193 ----
functions to prevent their misuse.
! A source code patch exists which remedies this problem.
-
***************
*** 212,218 ****
timestamp option, an attacker can cause a system panic.
! A source code patch exists which remedies this problem.
-
--- 199,205 ----
timestamp option, an attacker can cause a system panic.
! A source code patch exists which remedies this problem.
-
***************
*** 226,232 ****
includes and making use of a malicious document.
! A source code patch exists which remedies this problem.
-
--- 213,219 ----
includes and making use of a malicious document.
! A source code patch exists which remedies this problem.
-
***************
*** 237,243 ****
to retrieve the current working directory if the path is very long.
! A source code patch exists which remedies this problem.
-
--- 224,230 ----
to retrieve the current working directory if the path is very long.
! A source code patch exists which remedies this problem.
-
***************
*** 250,256 ****
credentials on a socket.
! A source code patch exists which remedies this problem.
-
--- 237,243 ----
credentials on a socket.
! A source code patch exists which remedies this problem.
-
***************
*** 259,265 ****
xl(4).
! A source code patch exists which remedies this problem.
-
--- 246,252 ----
xl(4).
! A source code patch exists which remedies this problem.
-
***************
*** 269,275 ****
and other ISAKMP/IKE implementations.
! A source code patch exists which remedies this problem.
-
--- 256,262 ----
and other ISAKMP/IKE implementations.
! A source code patch exists which remedies this problem.
-
***************
*** 283,289 ****
to exhaust memory and then crash when parsing such pages.
! A source code patch exists which remedies this problem.
-
--- 270,276 ----
to exhaust memory and then crash when parsing such pages.
! A source code patch exists which remedies this problem.
-
***************
*** 293,299 ****
be used to deny service to other users.
! A source code patch exists which remedies this problem.
-
--- 280,286 ----
be used to deny service to other users.
! A source code patch exists which remedies this problem.
-
***************
*** 303,309 ****
thus slow DNS queries.
! A source code patch exists which remedies this problem.
-
--- 290,296 ----
thus slow DNS queries.
! A source code patch exists which remedies this problem.
-
***************
*** 312,318 ****
restore(8).
! A source code patch exists which remedies this problem.
--- 299,305 ----
restore(8).
! A source code patch exists which remedies this problem.