===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata34.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -c -r1.55 -r1.56
*** www/errata34.html 2013/10/26 15:21:13 1.55
--- www/errata34.html 2014/02/27 17:26:45 1.56
***************
*** 57,63 ****
5.1,
5.2,
5.3,
! 5.4.
--- 57,64 ----
5.1,
5.2,
5.3,
! 5.4,
! 5.5.
***************
*** 200,206 ****
024: SECURITY FIX: June 10, 2004
! As
disclosed
by Thomas Walpuski
isakmpd(8)
--- 201,207 ----
024: SECURITY FIX: June 10, 2004
! As
disclosed
by Thomas Walpuski
isakmpd(8)
***************
*** 230,236 ****
has established a cross-realm trust with their realm. The flaw is due to
inadequate checking of the "transited" field in a Kerberos request. For
more details see
! Heimdal's announcement.
--- 231,237 ----
has established a cross-realm trust with their realm. The flaw is due to
inadequate checking of the "transited" field in a Kerberos request. For
more details see
! Heimdal's announcement.
***************
*** 352,358 ****
A source code patch exists which remedies the problem.
! 010: SECURITY FIX: February 5, 2004
A reference counting bug exists in the
shmat(2)
system call that could be used by an attacker to write to kernel memory
--- 353,359 ----
A source code patch exists which remedies the problem.
! 010: SECURITY FIX: February 5, 2004
A reference counting bug exists in the
shmat(2)
system call that could be used by an attacker to write to kernel memory
***************
*** 362,368 ****
A source code patch exists which remedies the problem.
! 009: SECURITY FIX: January 13, 2004
Several message handling flaws in
isakmpd(8)
have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also
--- 363,369 ----
A source code patch exists which remedies the problem.
! 009: SECURITY FIX: January 13, 2004
Several message handling flaws in
isakmpd(8)
have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also
***************
*** 385,391 ****
007: RELIABILITY FIX: November 20, 2003
! It is possible for a local user to cause a crash via
sysctl(3) with certain arguments.
--- 386,392 ----
007: RELIABILITY FIX: November 20, 2003
! It is possible for a local user to cause a crash via
sysctl(3) with certain arguments.
***************
*** 513,521 ****
!
www@openbsd.org
!
$OpenBSD: errata34.html,v 1.55 2013/10/26 15:21:13 deraadt Exp $