===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata37.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -r1.57 -r1.58
--- www/errata37.html 2016/08/15 02:22:06 1.57
+++ www/errata37.html 2016/10/16 19:11:29 1.58
@@ -70,7 +70,7 @@
@@ -95,7 +95,7 @@
Clients authorized to connect to the X server are able to crash it and to execute
malicious code within the X server.
-
+
A source code patch exists which remedies this problem.
@@ -106,7 +106,7 @@
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
-
+
A source code patch exists which remedies this problem.
@@ -121,7 +121,7 @@
This can be exploited to execute shell commands with privileges of the user running
scp(1).
-
+
A source code patch exists which remedies this problem.
@@ -133,7 +133,7 @@
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
-
+
A source code patch exists which remedies this problem.
@@ -149,7 +149,7 @@
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
-
+
A source code patch exists which remedies this problem.
@@ -158,7 +158,7 @@
All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
-
+
A source code patch exists which remedies this problem.
@@ -168,7 +168,7 @@
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
-
+
A source code patch exists which remedies this problem.
@@ -179,7 +179,7 @@
isakmpd(8)
may occur.
-
+
A source code patch exists which remedies this problem.
@@ -191,7 +191,7 @@
which may be exploitable.
Please note that this fixes a different buffer overflow than the previous zlib patch.
-
+
A source code patch exists which remedies this problem.
@@ -202,7 +202,7 @@
compress(3)
which may be exploitable.
-
+
A source code patch exists which remedies this problem.
@@ -215,7 +215,7 @@
is followed by an entry that grants sudo ALL privileges to
another user.
-
+
A source code patch exists which remedies this problem.
@@ -228,7 +228,7 @@
ipsec(4)
credentials for a socket can result in a kernel panic.
-
+
A source code patch exists which remedies this problem.
@@ -242,7 +242,7 @@
CAN-2005-0753
.
-
+
A source code patch exists which remedies this problem.