===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -c -r1.57 -r1.58
*** www/errata37.html 2016/08/15 02:22:06 1.57
--- www/errata37.html 2016/10/16 19:11:29 1.58
***************
*** 70,76 ****
--- 70,76 ----
***************
*** 95,101 ****
Clients authorized to connect to the X server are able to crash it and to execute
malicious code within the X server.
!
A source code patch exists which remedies this problem.
--- 95,101 ----
Clients authorized to connect to the X server are able to crash it and to execute
malicious code within the X server.
!
A source code patch exists which remedies this problem.
***************
*** 106,112 ****
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
!
A source code patch exists which remedies this problem.
--- 106,112 ----
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
!
A source code patch exists which remedies this problem.
***************
*** 121,127 ****
This can be exploited to execute shell commands with privileges of the user running
scp(1).
!
A source code patch exists which remedies this problem.
--- 121,127 ----
This can be exploited to execute shell commands with privileges of the user running
scp(1).
!
A source code patch exists which remedies this problem.
***************
*** 133,139 ****
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
!
A source code patch exists which remedies this problem.
--- 133,139 ----
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
!
A source code patch exists which remedies this problem.
***************
*** 149,155 ****
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
!
A source code patch exists which remedies this problem.
--- 149,155 ----
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
!
A source code patch exists which remedies this problem.
***************
*** 158,164 ****
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
!
A source code patch exists which remedies this problem.
--- 158,164 ----
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
!
A source code patch exists which remedies this problem.
***************
*** 168,174 ****
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
!
A source code patch exists which remedies this problem.
--- 168,174 ----
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
!
A source code patch exists which remedies this problem.
***************
*** 179,185 ****
isakmpd(8)
may occur.
!
A source code patch exists which remedies this problem.
--- 179,185 ----
isakmpd(8)
may occur.
!
A source code patch exists which remedies this problem.
***************
*** 191,197 ****
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
--- 191,197 ----
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
!
A source code patch exists which remedies this problem.
***************
*** 202,208 ****
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
--- 202,208 ----
compress(3)
which may be exploitable.
!
A source code patch exists which remedies this problem.
***************
*** 215,221 ****
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
--- 215,221 ----
is followed by an entry that grants sudo ALL privileges to
another user.
!
A source code patch exists which remedies this problem.
***************
*** 228,234 ****
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
--- 228,234 ----
ipsec(4)
credentials for a socket can result in a kernel panic.
!
A source code patch exists which remedies this problem.
***************
*** 242,248 ****
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.
--- 242,248 ----
CAN-2005-0753
.
!
A source code patch exists which remedies this problem.