===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata38.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -c -r1.43 -r1.44
*** www/errata38.html 2014/03/28 03:04:30 1.43
--- www/errata38.html 2014/03/31 03:12:47 1.44
***************
*** 6,12 ****
-
--- 6,11 ----
***************
*** 65,94 ****
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
!
The patches below are available in CVS via the
OPENBSD_3_8
patch branch.
-
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
--- 64,81 ----
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
! The patches below are available in CVS via the
OPENBSD_3_8
patch branch.
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
***************
*** 103,109 ****
CVE-2006-5051
! A source code patch exists which remedies this problem.
-
--- 90,96 ----
CVE-2006-5051
! A source code patch exists which remedies this problem.
-
***************
*** 115,121 ****
privilege escalation.
! A source code patch exists which remedies this problem.
-
--- 102,108 ----
privilege escalation.
! A source code patch exists which remedies this problem.
-
***************
*** 132,138 ****
CVE-2006-2940
! A source code patch exists which remedies this problem.
-
--- 119,125 ----
CVE-2006-2940
! A source code patch exists which remedies this problem.
-
***************
*** 144,150 ****
CVE-2006-3918
! A source code patch exists which remedies this problem.
-
--- 131,137 ----
CVE-2006-3918
! A source code patch exists which remedies this problem.
-
***************
*** 155,161 ****
CVE-2006-4339
! A source code patch exists which remedies this problem.
-
--- 142,148 ----
CVE-2006-4339
! A source code patch exists which remedies this problem.
-
***************
*** 171,177 ****
CVE-2006-4096
! A source code patch exists which remedies this problem.
-
--- 158,164 ----
CVE-2006-4096
! A source code patch exists which remedies this problem.
-
***************
*** 183,189 ****
CVE-2006-4304
! A source code patch exists which remedies this problem.
-
--- 170,176 ----
CVE-2006-4304
! A source code patch exists which remedies this problem.
-
***************
*** 197,203 ****
replay counter.
! A source code patch exists which remedies this problem.
-
--- 184,190 ----
replay counter.
! A source code patch exists which remedies this problem.
-
***************
*** 206,212 ****
sempahores have been allocated.
! A source code patch exists which remedies this problem.
-
--- 193,199 ----
sempahores have been allocated.
! A source code patch exists which remedies this problem.
-
***************
*** 219,225 ****
CVE-2006-3122
! A source code patch exists which remedies this problem.
-
--- 206,212 ----
CVE-2006-3122
! A source code patch exists which remedies this problem.
-
***************
*** 229,235 ****
sendmail to crash.
! A source code patch exists which remedies this problem.
-
--- 216,222 ----
sendmail to crash.
! A source code patch exists which remedies this problem.
-
***************
*** 242,248 ****
buffer overflow. CVE-2006-3747
! A source code patch exists which remedies this problem.
-
--- 229,235 ----
buffer overflow. CVE-2006-3747
! A source code patch exists which remedies this problem.
-
***************
*** 255,261 ****
malformed MIME message exists.
! A source code patch exists which remedies this problem.
-
--- 242,248 ----
malformed MIME message exists.
! A source code patch exists which remedies this problem.
-
***************
*** 266,272 ****
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
--- 253,259 ----
malicious code within the X server.
! A source code patch exists which remedies this problem.
-
***************
*** 276,282 ****
privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.
-
--- 263,269 ----
privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.
-
***************
*** 290,296 ****
scp(1).
! A source code patch exists which remedies this problem.
-
--- 277,283 ----
scp(1).
! A source code patch exists which remedies this problem.
-
***************
*** 301,307 ****
unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.
-
--- 288,294 ----
unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.
-
***************
*** 316,322 ****
instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.
-
--- 303,309 ----
instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.
-
***************
*** 324,330 ****
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.
-
--- 311,317 ----
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.
-
***************
*** 333,339 ****
may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.
--- 320,326 ----
may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.