===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata29.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- www/errata29.html 2001/11/14 01:38:00 1.2
+++ www/errata29.html 2001/11/14 21:33:10 1.3
@@ -52,7 +52,7 @@
A security issue exists in the vi.recover script that may allow an attacker
to remove arbitrary zero-length files, regardless of ownership.
-A source code patch exists which remedies the problem
+A source code patch exists which remedies the problem.
@@ -64,7 +64,7 @@
some UUCP commands are run as root (and daemon) from cron it is possible
to leverage compromise of the UUCP user to gain root.
-A source code patch exists which remedies the problem
+A source code patch exists which remedies the problem.
@@ -75,7 +75,7 @@
access (ie: listed in either /etc/hosts.lpd or /etc/hosts.equiv)
may be used to mount an attack.
-A source code patch exists which remedies the problem
+A source code patch exists which remedies the problem.
@@ -83,7 +83,7 @@
that may allow an attacker on the local host to gain root privileges by
specifying out-of-bounds debug parameters.
-A source code patch exists which remedies the problem
+A source code patch exists which remedies the problem.
@@ -93,7 +93,7 @@
privileges can initiate this attack. In default installs, only super-user has
mount privileges. The kern.usermount sysctl(3) controls whether other users have mount privileges.
-A source code patch exists which remedies the problem
+A source code patch exists which remedies the problem.
$OpenBSD: errata29.html,v 1.2 2001/11/14 01:38:00 millert Exp $
+
$OpenBSD: errata29.html,v 1.3 2001/11/14 21:33:10 miod Exp $