===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -r1.39 -r1.40
--- www/errata37.html 2014/03/28 03:04:30 1.39
+++ www/errata37.html 2014/03/31 03:12:47 1.40
@@ -6,7 +6,6 @@
-
@@ -65,30 +64,18 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_3_7
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -99,7 +86,7 @@
malicious code within the X server.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -109,7 +96,7 @@
privileges of the user running sendmail, typically root.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -123,7 +110,7 @@
scp(1).
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -134,7 +121,7 @@
unless the machine is running at lower securelevels or with an open X11 aperture.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -149,7 +136,7 @@
instead of the LDT so that it is more robust as well.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -157,7 +144,7 @@
Do not allow users to trick suid programs into re-opening files via /dev/fd.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -166,7 +153,7 @@
may be exploitable under certain conditions.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -176,7 +163,7 @@
may occur.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -187,7 +174,7 @@
Please note that this fixes a different buffer overflow than the previous zlib patch.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -197,7 +184,7 @@
which may be exploitable.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -209,7 +196,7 @@
another user.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -221,7 +208,7 @@
credentials for a socket can result in a kernel panic.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -234,7 +221,7 @@
.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.