===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata38.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -r1.31 -r1.32
--- www/errata38.html 2010/03/08 21:53:37 1.31
+++ www/errata38.html 2010/07/08 19:00:07 1.32
@@ -54,7 +54,7 @@
@@ -106,7 +106,7 @@
Chris Evans. This could be exploited for DoS, limited kmem reads or local
privilege escalation.
-
+
A source code patch exists which remedies this problem.
@@ -123,7 +123,7 @@
CVE-2006-4343,
CVE-2006-2940
-
+
A source code patch exists which remedies this problem.
@@ -135,7 +135,7 @@
style attacks.
CVE-2006-3918
-
+
A source code patch exists which remedies this problem.
@@ -146,7 +146,7 @@
valid PKCS#1 v1.5 signature.
CVE-2006-4339
-
+
A source code patch exists which remedies this problem.
@@ -162,7 +162,7 @@
CVE-2006-4095
CVE-2006-4096
-
+
A source code patch exists which remedies this problem.
@@ -174,7 +174,7 @@
connection causing the kernel to panic.
CVE-2006-4304
-
+
A source code patch exists which remedies this problem.
@@ -188,7 +188,7 @@
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the
replay counter.
-
+
A source code patch exists which remedies this problem.
@@ -197,7 +197,7 @@
It is possible to cause the kernel to panic when more than the default number of
sempahores have been allocated.
-
+
A source code patch exists which remedies this problem.
@@ -210,7 +210,7 @@
to exit by sending a DHCPDISCOVER packet with a 32-byte client identifier option.
CVE-2006-3122
-
+
A source code patch exists which remedies this problem.
@@ -220,7 +220,7 @@
with really long header lines could trigger a use-after-free bug causing
sendmail to crash.
-
+
A source code patch exists which remedies this problem.
@@ -233,7 +233,7 @@
could be triggered remotely. The default install is not affected by the
buffer overflow. CVE-2006-3747
-
+
A source code patch exists which remedies this problem.
@@ -246,7 +246,7 @@
delivered. However, mail messages in the queue may not be reattempted if a
malformed MIME message exists.
-
+
A source code patch exists which remedies this problem.
@@ -257,7 +257,7 @@
Clients authorized to connect to the X server are able to crash it and to execute
malicious code within the X server.
-
+
A source code patch exists which remedies this problem.
@@ -267,7 +267,7 @@
asynchronous signals. A remote attacker may be able to execute arbitrary code with the
privileges of the user running sendmail, typically root.
-
+
A source code patch exists which remedies this problem.
@@ -281,7 +281,7 @@
This can be exploited to execute shell commands with privileges of the user running
scp(1).
-
+
A source code patch exists which remedies this problem.
@@ -292,7 +292,7 @@
so even root is blocked from accessing the ioports
unless the machine is running at lower securelevels or with an open X11 aperture.
-
+
A source code patch exists which remedies this problem.
@@ -307,7 +307,7 @@
requests need it to. This is now implemented using only GDT selectors
instead of the LDT so that it is more robust as well.
-
+
A source code patch exists which remedies this problem.
@@ -315,7 +315,7 @@
002: SECURITY FIX: January 5, 2006 All architectures
Do not allow users to trick suid programs into re-opening files via /dev/fd.
-
+
A source code patch exists which remedies this problem.
@@ -324,7 +324,7 @@
A buffer overflow has been found in the Perl interpreter with the sprintf function which
may be exploitable under certain conditions.
-
+
A source code patch exists which remedies this problem.
@@ -368,7 +368,7 @@