[BACK]Return to errata51.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata51.html between version 1.9 and 1.10

version 1.9, 2014/03/28 03:04:30 version 1.10, 2014/03/31 03:12:47
Line 6 
Line 6 
 <meta name="description" content="the OpenBSD CD errata page">  <meta name="description" content="the OpenBSD CD errata page">
 <meta name="keywords" content="openbsd,cd,errata">  <meta name="keywords" content="openbsd,cd,errata">
 <meta name="distribution" content="global">  <meta name="distribution" content="global">
 <meta name="copyright" content="This document copyright 2012 by OpenBSD.">  
 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">  <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
 </head>  </head>
   
Line 64 
Line 63 
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.1.tar.gz">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.1.tar.gz">
 You can also fetch a tar.gz file containing all the following patches</a>.  You can also fetch a tar.gz file containing all the following patches</a>.
 This file is updated once a day.  This file is updated once a day.
   <p>
   
 <p> The patches below are available in CVS via the  The patches below are available in CVS via the
 <code>OPENBSD_5_1</code> <a href="stable.html">patch branch</a>.  <code>OPENBSD_5_1</code> <a href="stable.html">patch branch</a>.
   
 <p>  <p>
   
 For more detailed information on how to install patches to OpenBSD, please  For more detailed information on how to install patches to OpenBSD, please
 consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.  consult the <a href="./faq/faq10.html#Patches">OpenBSD FAQ</a>.
   <p>
   
 <hr>  <hr>
   
 <!-- Temporarily put anchors for all archs here.  Remove later. -->  
 <a name="all"></a>  
 <a name="alpha"></a>  
 <a name="amd64"></a>  
 <a name="armish"></a>  
 <a name="hp300"></a>  
 <a name="hppa"></a>  
 <a name="i386"></a>  
 <a name="landisk"></a>  
 <a name="loongson"></a>  
 <a name="luna88k"></a>  
 <a name="mac68k"></a>  
 <a name="macppc"></a>  
 <a name="mvme68k"></a>  
 <a name="mvme88k"></a>  
 <a name="sgi"></a>  
 <a name="socppc"></a>  
 <a name="sparc"></a>  
 <a name="sparc64"></a>  
 <a name="vax"></a>  
 <a name="zaurus"></a>  
   
 <ul>  <ul>
 <li><a name="001_libcrypto"></a>  <li><a name="001_libcrypto"></a>
 <font color="#009000"><strong>001: SECURITY FIX: April 23, 2012</strong></font>  <font color="#009000"><strong>001: SECURITY FIX: April 23, 2012</strong></font>
Line 102 
Line 82 
 A heap overflow vulnerability has been found in libcrypto's ASN.1 parsing code  A heap overflow vulnerability has been found in libcrypto's ASN.1 parsing code
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110">CVE-2012-2110</a>).  (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110">CVE-2012-2110</a>).
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.1/common/001_libcrypto.patch">A source code patch exists which remedies this problem</a>.<br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.1/common/001_libcrypto.patch">
   A source code patch exists which remedies this problem.</a>
 <p>  <p>
   
 </ul>  </ul>

Legend:
Removed from v.1.9  
changed lines
  Added in v.1.10