===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -c -r1.28 -r1.29
*** www/errata37.html 2010/03/08 21:53:37 1.28
--- www/errata37.html 2010/07/08 19:00:07 1.29
***************
*** 54,60 ****
--- 90,96 ----
Clients authorized to connect to the X server are able to crash it and to execute
malicious code within the X server.
!
A source code patch exists which remedies this problem.
***************
*** 100,106 ****
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
!
A source code patch exists which remedies this problem.
--- 100,106 ----
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
!
A source code patch exists which remedies this problem.
***************
*** 114,120 ****
This can be exploited to execute shell commands with privileges of the user running
scp(1).
!
A source code patch exists which remedies this problem.
--- 114,120 ----
This can be exploited to execute shell commands with privileges of the user running
scp(1).
!
A source code patch exists which remedies this problem.
***************
*** 125,131 ****
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
!
A source code patch exists which remedies this problem.
--- 125,131 ----
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
!
A source code patch exists which remedies this problem.
***************
*** 140,146 ****
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
!
A source code patch exists which remedies this problem.
--- 140,146 ----
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
!
A source code patch exists which remedies this problem.
***************
*** 148,154 ****
008: SECURITY FIX: January 5, 2006 All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
!
A source code patch exists which remedies this problem.
--- 148,154 ----
008: SECURITY FIX: January 5, 2006 All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
!
A source code patch exists which remedies this problem.
***************
*** 157,163 ****
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
!
A source code patch exists which remedies this problem.
--- 157,163 ----
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
!
A source code patch exists which remedies this problem.
***************
*** 167,173 ****
isakmpd(8)
may occur.
!
A source code patch exists which remedies this problem.
--- 167,173 ----
isakmpd(8)
may occur.
!
A source code patch exists which remedies this problem.
***************
*** 178,184 ****
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
--- 178,184 ----
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
***************
*** 188,194 ****
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
--- 188,194 ----
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
***************
*** 200,206 ****
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
--- 200,206 ----
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
***************
*** 212,218 ****
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
--- 212,218 ----
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 225,231 ****
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.
--- 225,231 ----
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.
*************** *** 269,275 ****