===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -c -r1.39 -r1.40
*** www/errata37.html 2014/03/28 03:04:30 1.39
--- www/errata37.html 2014/03/31 03:12:47 1.40
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 65,94 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_3_7
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
--- 64,81 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_3_7
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
***************
*** 99,105 ****
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
--- 86,92 ----
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
***************
*** 109,115 ****
privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.
-
--- 96,102 ----
privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.
-
***************
*** 123,129 ****
scp(1).
! A source code patch exists which remedies this problem.
-
--- 110,116 ----
scp(1).
! A source code patch exists which remedies this problem.
-
***************
*** 134,140 ****
unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.
-
--- 121,127 ----
unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.
-
***************
*** 149,155 ****
instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.
-
--- 136,142 ----
instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.
-
***************
*** 157,163 ****
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.
-
--- 144,150 ----
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.
-
***************
*** 166,172 ****
may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.
-
--- 153,159 ----
may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.
-
***************
*** 176,182 ****
may occur.
! A source code patch exists which remedies this problem.
-
--- 163,169 ----
may occur.
! A source code patch exists which remedies this problem.
-
***************
*** 187,193 ****
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.
-
--- 174,180 ----
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.
-
***************
*** 197,203 ****
which may be exploitable.
! A source code patch exists which remedies this problem.
-
--- 184,190 ----
which may be exploitable.
! A source code patch exists which remedies this problem.
-
***************
*** 209,215 ****
another user.
! A source code patch exists which remedies this problem.
-
--- 196,202 ----
another user.
! A source code patch exists which remedies this problem.
-
***************
*** 221,227 ****
credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.
-
--- 208,214 ----
credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.
-
***************
*** 234,240 ****
.
! A source code patch exists which remedies this problem.
--- 221,227 ----
.
! A source code patch exists which remedies this problem.