=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v retrieving revision 1.28 retrieving revision 1.29 diff -c -r1.28 -r1.29 *** www/errata37.html 2010/03/08 21:53:37 1.28 --- www/errata37.html 2010/07/08 19:00:07 1.29 *************** *** 54,60 ****

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. --- 54,60 ----

! You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. *************** *** 90,96 **** Clients authorized to connect to the X server are able to crash it and to execute malicious code within the X server.
! A source code patch exists which remedies this problem.

--- 90,96 ---- Clients authorized to connect to the X server are able to crash it and to execute malicious code within the X server.
! A source code patch exists which remedies this problem.

*************** *** 100,106 **** asynchronous signals. A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.

--- 100,106 ---- asynchronous signals. A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.
! A source code patch exists which remedies this problem.

*************** *** 114,120 **** This can be exploited to execute shell commands with privileges of the user running scp(1).
! A source code patch exists which remedies this problem.

--- 114,120 ---- This can be exploited to execute shell commands with privileges of the user running scp(1).
! A source code patch exists which remedies this problem.

*************** *** 125,131 **** so even root is blocked from accessing the ioports unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.

--- 125,131 ---- so even root is blocked from accessing the ioports unless the machine is running at lower securelevels or with an open X11 aperture.
! A source code patch exists which remedies this problem.

*************** *** 140,146 **** requests need it to. This is now implemented using only GDT selectors instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.

--- 140,146 ---- requests need it to. This is now implemented using only GDT selectors instead of the LDT so that it is more robust as well.
! A source code patch exists which remedies this problem.

*************** *** 148,154 **** 008: SECURITY FIX: January 5, 2006   All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.

--- 148,154 ---- 008: SECURITY FIX: January 5, 2006   All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
! A source code patch exists which remedies this problem.

*************** *** 157,163 **** A buffer overflow has been found in the Perl interpreter with the sprintf function which may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.

--- 157,163 ---- A buffer overflow has been found in the Perl interpreter with the sprintf function which may be exploitable under certain conditions.
! A source code patch exists which remedies this problem.

*************** *** 167,173 **** isakmpd(8) may occur.
! A source code patch exists which remedies this problem.

--- 167,173 ---- isakmpd(8) may occur.
! A source code patch exists which remedies this problem.

*************** *** 178,184 **** which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.

--- 178,184 ---- which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
! A source code patch exists which remedies this problem.

*************** *** 188,194 **** compress(3) which may be exploitable.
! A source code patch exists which remedies this problem.

--- 188,194 ---- compress(3) which may be exploitable.
! A source code patch exists which remedies this problem.

*************** *** 200,206 **** is followed by an entry that grants sudo ALL privileges to another user.
! A source code patch exists which remedies this problem.

--- 200,206 ---- is followed by an entry that grants sudo ALL privileges to another user.
! A source code patch exists which remedies this problem.

*************** *** 212,218 **** ipsec(4) credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.

--- 212,218 ---- ipsec(4) credentials for a socket can result in a kernel panic.
! A source code patch exists which remedies this problem.

*************** *** 225,231 **** CAN-2005-0753 .
! A source code patch exists which remedies this problem.

--- 225,231 ---- CAN-2005-0753 .
! A source code patch exists which remedies this problem.

*************** *** 269,275 ****


OpenBSD www@openbsd.org !
$OpenBSD: errata37.html,v 1.28 2010/03/08 21:53:37 deraadt Exp $ --- 269,275 ----
OpenBSD www@openbsd.org !
$OpenBSD: errata37.html,v 1.29 2010/07/08 19:00:07 sthen Exp $