=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata34.html,v retrieving revision 1.55 retrieving revision 1.56 diff -c -r1.55 -r1.56 *** www/errata34.html 2013/10/26 15:21:13 1.55 --- www/errata34.html 2014/02/27 17:26:45 1.56 *************** *** 57,63 **** 5.1, 5.2, 5.3, ! 5.4.

--- 57,64 ---- 5.1, 5.2, 5.3, ! 5.4, ! 5.5.

*************** *** 200,206 ****

  • 024: SECURITY FIX: June 10, 2004
    ! As disclosed by Thomas Walpuski isakmpd(8) --- 201,207 ----

  • 024: SECURITY FIX: June 10, 2004
    ! As disclosed by Thomas Walpuski isakmpd(8) *************** *** 230,236 **** has established a cross-realm trust with their realm. The flaw is due to inadequate checking of the "transited" field in a Kerberos request. For more details see ! Heimdal's announcement.
    --- 231,237 ---- has established a cross-realm trust with their realm. The flaw is due to inadequate checking of the "transited" field in a Kerberos request. For more details see ! Heimdal's announcement.
    *************** *** 352,358 **** A source code patch exists which remedies the problem.

  • ! 010: SECURITY FIX: February 5, 2004
    A reference counting bug exists in the shmat(2) system call that could be used by an attacker to write to kernel memory --- 353,359 ---- A source code patch exists which remedies the problem.

  • ! 010: SECURITY FIX: February 5, 2004
    A reference counting bug exists in the shmat(2) system call that could be used by an attacker to write to kernel memory *************** *** 362,368 **** A source code patch exists which remedies the problem.

  • ! 009: SECURITY FIX: January 13, 2004
    Several message handling flaws in isakmpd(8) have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also --- 363,369 ---- A source code patch exists which remedies the problem.

  • ! 009: SECURITY FIX: January 13, 2004
    Several message handling flaws in isakmpd(8) have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also *************** *** 385,391 ****

  • 007: RELIABILITY FIX: November 20, 2003
    ! It is possible for a local user to cause a crash via sysctl(3) with certain arguments.
    --- 386,392 ----

  • 007: RELIABILITY FIX: November 20, 2003
    ! It is possible for a local user to cause a crash via sysctl(3) with certain arguments.
    *************** *** 513,521 ****

    !
    OpenBSD www@openbsd.org !
    $OpenBSD: errata34.html,v 1.55 2013/10/26 15:21:13 deraadt Exp $ --- 514,522 ----

    ! OpenBSD www@openbsd.org !
    $OpenBSD: errata34.html,v 1.56 2014/02/27 17:26:45 deraadt Exp $