=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata29.html,v retrieving revision 1.2 retrieving revision 1.3 diff -u -r1.2 -r1.3 --- www/errata29.html 2001/11/14 01:38:00 1.2 +++ www/errata29.html 2001/11/14 21:33:10 1.3 @@ -52,7 +52,7 @@ A security issue exists in the vi.recover script that may allow an attacker to remove arbitrary zero-length files, regardless of ownership.
-A source code patch exists which remedies the problem +A source code patch exists which remedies the problem.

  • 015: SECURITY FIX: September 11, 2001
    @@ -64,7 +64,7 @@ some UUCP commands are run as root (and daemon) from cron it is possible to leverage compromise of the UUCP user to gain root.
    -
    A source code patch exists which remedies the problem +A source code patch exists which remedies the problem.

  • 014: SECURITY FIX: August 29, 2001
    @@ -75,7 +75,7 @@ access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv) may be used to mount an attack.
    -
    A source code patch exists which remedies the problem +A source code patch exists which remedies the problem.

  • 013: SECURITY FIX: August 21, 2001
    @@ -83,7 +83,7 @@ that may allow an attacker on the local host to gain root privileges by specifying out-of-bounds debug parameters.
    -
    A source code patch exists which remedies the problem +A source code patch exists which remedies the problem.

  • 012: SECURITY FIX: July 30, 2001
    @@ -93,7 +93,7 @@ privileges can initiate this attack. In default installs, only super-user has mount privileges. The kern.usermount
    sysctl(3) controls whether other users have mount privileges.
    -A source code patch exists which remedies the problem +A source code patch exists which remedies the problem.

  • 011: RELIABILITY FIX: July 15, 2001 @@ -287,7 +287,7 @@ OpenBSD www@openbsd.org -
    $OpenBSD: errata29.html,v 1.2 2001/11/14 01:38:00 millert Exp $ +
    $OpenBSD: errata29.html,v 1.3 2001/11/14 21:33:10 miod Exp $