===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -r1.28 -r1.29
--- www/errata37.html 2010/03/08 21:53:37 1.28
+++ www/errata37.html 2010/07/08 19:00:07 1.29
@@ -54,7 +54,7 @@
@@ -100,7 +100,7 @@
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
-
+
A source code patch exists which remedies this problem.
@@ -114,7 +114,7 @@
This can be exploited to execute shell commands with privileges of the user running
scp(1).
-
+
A source code patch exists which remedies this problem.
@@ -125,7 +125,7 @@
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
-
+
A source code patch exists which remedies this problem.
@@ -140,7 +140,7 @@
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
-
+
A source code patch exists which remedies this problem.
@@ -148,7 +148,7 @@
008: SECURITY FIX: January 5, 2006 All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
-
+
A source code patch exists which remedies this problem.
@@ -157,7 +157,7 @@
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
-
+
A source code patch exists which remedies this problem.
@@ -167,7 +167,7 @@
isakmpd(8)
may occur.
-
+
A source code patch exists which remedies this problem.
@@ -178,7 +178,7 @@
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
-
+
A source code patch exists which remedies this problem.
@@ -188,7 +188,7 @@
compress(3)
which may be exploitable.
-
+
A source code patch exists which remedies this problem.
@@ -200,7 +200,7 @@
is followed by an entry that grants sudo ALL privileges to
another user.
-
+
A source code patch exists which remedies this problem.
@@ -212,7 +212,7 @@
ipsec(4)
credentials for a socket can result in a kernel panic.
-
+
A source code patch exists which remedies this problem.
@@ -225,7 +225,7 @@
CAN-2005-0753
.
-
+
A source code patch exists which remedies this problem.
@@ -269,7 +269,7 @@