=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata36.html,v retrieving revision 1.51 retrieving revision 1.52 diff -u -r1.51 -r1.52 --- www/errata36.html 2016/08/15 02:22:06 1.51 +++ www/errata36.html 2016/10/16 19:11:29 1.52 @@ -70,7 +70,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day.

@@ -95,7 +95,7 @@ which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
- + A source code patch exists which remedies this problem.

@@ -106,7 +106,7 @@ compress(3) which may be exploitable.
- + A source code patch exists which remedies this problem.

@@ -119,7 +119,7 @@ is followed by an entry that grants sudo ALL privileges to another user.
- + A source code patch exists which remedies this problem.

@@ -132,7 +132,7 @@ ipsec(4) credentials for a socket can result in a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -145,7 +145,7 @@ CAN-2005-0753 .
- + A source code patch exists which remedies this problem.

@@ -156,7 +156,7 @@ tcp(4) timestamps.
- + A source code patch exists which remedies this problem.

@@ -171,7 +171,7 @@ Noone should use telnet anymore. Please use ssh(1).
- + A source code patch exists which remedies this problem.

@@ -183,7 +183,7 @@ stack can lead to memory exhaustion or processing of TCP segments with invalid SACK options and cause a system crash.
- + A source code patch exists which remedies this problem.

@@ -194,7 +194,7 @@ copy(9) functions to prevent their misuse.
- + A source code patch exists which remedies this problem.

@@ -205,7 +205,7 @@ copy(9) functions to prevent their misuse.
- + A source code patch exists which remedies this problem.

@@ -218,7 +218,7 @@ retransmit timeout. By sending packets with specific values in the TCP timestamp option, an attacker can cause a system panic.
- + A source code patch exists which remedies this problem.

@@ -233,7 +233,7 @@ This would require enabling the XBitHack directive or server-side includes and making use of a malicious document.
- + A source code patch exists which remedies this problem.

@@ -245,7 +245,7 @@ library function contains a memory management error, which causes failure to retrieve the current working directory if the path is very long.
- + A source code patch exists which remedies this problem.

@@ -259,7 +259,7 @@ ipsec(4) credentials on a socket.
- + A source code patch exists which remedies this problem.

@@ -269,7 +269,7 @@ Fix for transmit side breakage on macppc and mbuf leaks with xl(4).
- + A source code patch exists which remedies this problem.

@@ -280,7 +280,7 @@ isakmpd(8) and other ISAKMP/IKE implementations.
- + A source code patch exists which remedies this problem.

@@ -295,7 +295,7 @@ lynx(1) to exhaust memory and then crash when parsing such pages.
- + A source code patch exists which remedies this problem.

@@ -306,7 +306,7 @@ contains a bug that allows an attacker to crash his own connection, but it cannot be used to deny service to other users.
- + A source code patch exists which remedies this problem.

@@ -317,7 +317,7 @@ cases where IPv6 connectivity is non-existent. This results in unnecessary timeouts and thus slow DNS queries.
- + A source code patch exists which remedies this problem.

@@ -327,7 +327,7 @@ Fix detection of tape blocksize during device open. Corrects problem with restore(8).
- + A source code patch exists which remedies this problem.