=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v retrieving revision 1.28 retrieving revision 1.29 diff -u -r1.28 -r1.29 --- www/errata37.html 2010/03/08 21:53:37 1.28 +++ www/errata37.html 2010/07/08 19:00:07 1.29 @@ -54,7 +54,7 @@

- + You can also fetch a tar.gz file containing all the following patches. This file is updated once a day. @@ -90,7 +90,7 @@ Clients authorized to connect to the X server are able to crash it and to execute malicious code within the X server.
- + A source code patch exists which remedies this problem.

@@ -100,7 +100,7 @@ asynchronous signals. A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.
- + A source code patch exists which remedies this problem.

@@ -114,7 +114,7 @@ This can be exploited to execute shell commands with privileges of the user running scp(1).
- + A source code patch exists which remedies this problem.

@@ -125,7 +125,7 @@ so even root is blocked from accessing the ioports unless the machine is running at lower securelevels or with an open X11 aperture.
- + A source code patch exists which remedies this problem.

@@ -140,7 +140,7 @@ requests need it to. This is now implemented using only GDT selectors instead of the LDT so that it is more robust as well.
- + A source code patch exists which remedies this problem.

@@ -148,7 +148,7 @@ 008: SECURITY FIX: January 5, 2006   All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
- + A source code patch exists which remedies this problem.

@@ -157,7 +157,7 @@ A buffer overflow has been found in the Perl interpreter with the sprintf function which may be exploitable under certain conditions.
- + A source code patch exists which remedies this problem.

@@ -167,7 +167,7 @@ isakmpd(8) may occur.
- + A source code patch exists which remedies this problem.

@@ -178,7 +178,7 @@ which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
- + A source code patch exists which remedies this problem.

@@ -188,7 +188,7 @@ compress(3) which may be exploitable.
- + A source code patch exists which remedies this problem.

@@ -200,7 +200,7 @@ is followed by an entry that grants sudo ALL privileges to another user.
- + A source code patch exists which remedies this problem.

@@ -212,7 +212,7 @@ ipsec(4) credentials for a socket can result in a kernel panic.
- + A source code patch exists which remedies this problem.

@@ -225,7 +225,7 @@ CAN-2005-0753 .
- + A source code patch exists which remedies this problem.

@@ -269,7 +269,7 @@


OpenBSD www@openbsd.org -
$OpenBSD: errata37.html,v 1.28 2010/03/08 21:53:37 deraadt Exp $ +
$OpenBSD: errata37.html,v 1.29 2010/07/08 19:00:07 sthen Exp $