=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata36.html,v retrieving revision 1.51 retrieving revision 1.52 diff -c -r1.51 -r1.52 *** www/errata36.html 2016/08/15 02:22:06 1.51 --- www/errata36.html 2016/10/16 19:11:29 1.52 *************** *** 70,76 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

--- 70,76 ----


! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

*************** *** 95,101 **** which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.

--- 95,101 ---- which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.

*************** *** 106,112 **** compress(3) which may be exploitable.
! A source code patch exists which remedies this problem.

--- 106,112 ---- compress(3) which may be exploitable.
! A source code patch exists which remedies this problem.

*************** *** 119,125 **** is followed by an entry that grants sudo ALL privileges to another user.
! A source code patch exists which remedies this problem.

--- 119,125 ---- is followed by an entry that grants sudo ALL privileges to another user.
! A source code patch exists which remedies this problem.

*************** *** 132,138 **** ipsec(4) credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.

--- 132,138 ---- ipsec(4) credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.

*************** *** 145,151 **** CAN-2005-0753 .
! A source code patch exists which remedies this problem.

--- 145,151 ---- CAN-2005-0753 .
! A source code patch exists which remedies this problem.

*************** *** 156,162 **** tcp(4) timestamps.
! A source code patch exists which remedies this problem.

--- 156,162 ---- tcp(4) timestamps.
! A source code patch exists which remedies this problem.

*************** *** 171,177 **** Noone should use telnet anymore. Please use ssh(1).
! A source code patch exists which remedies this problem.

--- 171,177 ---- Noone should use telnet anymore. Please use ssh(1).
! A source code patch exists which remedies this problem.

*************** *** 183,189 **** stack can lead to memory exhaustion or processing of TCP segments with invalid SACK options and cause a system crash.
! A source code patch exists which remedies this problem.

--- 183,189 ---- stack can lead to memory exhaustion or processing of TCP segments with invalid SACK options and cause a system crash.
! A source code patch exists which remedies this problem.

*************** *** 194,200 **** copy(9) functions to prevent their misuse.
! A source code patch exists which remedies this problem.

--- 194,200 ---- copy(9) functions to prevent their misuse.
! A source code patch exists which remedies this problem.

*************** *** 205,211 **** copy(9) functions to prevent their misuse.
! A source code patch exists which remedies this problem.

--- 205,211 ---- copy(9) functions to prevent their misuse.
! A source code patch exists which remedies this problem.

*************** *** 218,224 **** retransmit timeout. By sending packets with specific values in the TCP timestamp option, an attacker can cause a system panic.
! A source code patch exists which remedies this problem.

--- 218,224 ---- retransmit timeout. By sending packets with specific values in the TCP timestamp option, an attacker can cause a system panic.
! A source code patch exists which remedies this problem.

*************** *** 233,239 **** This would require enabling the XBitHack directive or server-side includes and making use of a malicious document.
! A source code patch exists which remedies this problem.

--- 233,239 ---- This would require enabling the XBitHack directive or server-side includes and making use of a malicious document.
! A source code patch exists which remedies this problem.

*************** *** 245,251 **** library function contains a memory management error, which causes failure to retrieve the current working directory if the path is very long.
! A source code patch exists which remedies this problem.

--- 245,251 ---- library function contains a memory management error, which causes failure to retrieve the current working directory if the path is very long.
! A source code patch exists which remedies this problem.

*************** *** 259,265 **** ipsec(4) credentials on a socket.
! A source code patch exists which remedies this problem.

--- 259,265 ---- ipsec(4) credentials on a socket.
! A source code patch exists which remedies this problem.

*************** *** 269,275 **** Fix for transmit side breakage on macppc and mbuf leaks with xl(4).
! A source code patch exists which remedies this problem.

--- 269,275 ---- Fix for transmit side breakage on macppc and mbuf leaks with xl(4).
! A source code patch exists which remedies this problem.

*************** *** 280,286 **** isakmpd(8) and other ISAKMP/IKE implementations.
! A source code patch exists which remedies this problem.

--- 280,286 ---- isakmpd(8) and other ISAKMP/IKE implementations.
! A source code patch exists which remedies this problem.

*************** *** 295,301 **** lynx(1) to exhaust memory and then crash when parsing such pages.
! A source code patch exists which remedies this problem.

--- 295,301 ---- lynx(1) to exhaust memory and then crash when parsing such pages.
! A source code patch exists which remedies this problem.

*************** *** 306,312 **** contains a bug that allows an attacker to crash his own connection, but it cannot be used to deny service to other users.
! A source code patch exists which remedies this problem.

--- 306,312 ---- contains a bug that allows an attacker to crash his own connection, but it cannot be used to deny service to other users.
! A source code patch exists which remedies this problem.

*************** *** 317,323 **** cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and thus slow DNS queries.
! A source code patch exists which remedies this problem.

--- 317,323 ---- cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and thus slow DNS queries.
! A source code patch exists which remedies this problem.

*************** *** 327,333 **** Fix detection of tape blocksize during device open. Corrects problem with restore(8).
! A source code patch exists which remedies this problem.

--- 327,333 ---- Fix detection of tape blocksize during device open. Corrects problem with restore(8).
! A source code patch exists which remedies this problem.