87d697fd01
CVE-2011-3323: ospf6d *stack-based buffer overflow*, inter-area-prefix LSAs CVE-2011-3324: ospf6d assertion failure; DD LSAs with over-length header CVE-2011-3325: ospf crash(?) if a hello has a truncated header or invalid type CVE-2011-3326: ospf null deref if a link state update LSA has an unknown type CVE-2011-3327: bgp buffer overflow with malformed UPDATE (extended communities)
22 lines
918 B
Plaintext
22 lines
918 B
Plaintext
$OpenBSD: patch-doc_Makefile_in,v 1.9 2011/09/27 09:45:53 sthen Exp $
|
|
--- doc/Makefile.in.orig Mon Sep 26 15:56:07 2011
|
|
+++ doc/Makefile.in Tue Sep 27 08:03:24 2011
|
|
@@ -375,7 +375,7 @@ clean-libtool:
|
|
|
|
.texi.dvi:
|
|
TEXINPUTS="$(am__TEXINFO_TEX_DIR)$(PATH_SEPARATOR)$$TEXINPUTS" \
|
|
- MAKEINFO='$(MAKEINFO) $(AM_MAKEINFOFLAGS) $(MAKEINFOFLAGS) -I $(srcdir)' \
|
|
+ MAKEINFO='$(MAKEINFO) $(AM_MAKEINFOFLAGS) $(MAKEINFOFLAGS)' \
|
|
$(TEXI2DVI) $<
|
|
|
|
.texi.pdf:
|
|
@@ -751,7 +751,7 @@ install-info-am: $(INFO_DEPS)
|
|
case $$file in \
|
|
$(srcdir)/*) file=`echo "$$file" | sed "s|^$$srcdirstrip/||"`;; \
|
|
esac; \
|
|
- if test -f $$file; then d=.; else d=$(srcdir); fi; \
|
|
+ if test -f $$file; then d=.; else d=$(builddir); fi; \
|
|
file_i=`echo "$$file" | sed 's|\.info$$||;s|$$|.i|'`; \
|
|
for ifile in $$d/$$file $$d/$$file-[0-9] $$d/$$file-[0-9][0-9] \
|
|
$$d/$$file_i[0-9] $$d/$$file_i[0-9][0-9] ; do \
|