===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata38.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -r1.43 -r1.44
--- www/errata38.html 2014/03/28 03:04:30 1.43
+++ www/errata38.html 2014/03/31 03:12:47 1.44
@@ -6,7 +6,6 @@
-
@@ -65,30 +64,18 @@
You can also fetch a tar.gz file containing all the following patches.
This file is updated once a day.
+
-
The patches below are available in CVS via the
+The patches below are available in CVS via the
OPENBSD_3_8
patch branch.
-
+
For more detailed information on how to install patches to OpenBSD, please
consult the OpenBSD FAQ.
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
@@ -103,7 +90,7 @@
CVE-2006-5051
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -115,7 +102,7 @@
privilege escalation.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -132,7 +119,7 @@
CVE-2006-2940
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -144,7 +131,7 @@
CVE-2006-3918
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -155,7 +142,7 @@
CVE-2006-4339
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -171,7 +158,7 @@
CVE-2006-4096
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -183,7 +170,7 @@
CVE-2006-4304
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -197,7 +184,7 @@
replay counter.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -206,7 +193,7 @@
sempahores have been allocated.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -219,7 +206,7 @@
CVE-2006-3122
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -229,7 +216,7 @@
sendmail to crash.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -242,7 +229,7 @@
buffer overflow. CVE-2006-3747
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -255,7 +242,7 @@
malformed MIME message exists.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -266,7 +253,7 @@
malicious code within the X server.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -276,7 +263,7 @@
privileges of the user running sendmail, typically root.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -290,7 +277,7 @@
scp(1).
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -301,7 +288,7 @@
unless the machine is running at lower securelevels or with an open X11 aperture.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -316,7 +303,7 @@
instead of the LDT so that it is more robust as well.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -324,7 +311,7 @@
Do not allow users to trick suid programs into re-opening files via /dev/fd.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.
-
@@ -333,7 +320,7 @@
may be exploitable under certain conditions.
-A source code patch exists which remedies this problem.
+A source code patch exists which remedies this problem.