===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata34.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -r1.55 -r1.56
--- www/errata34.html 2013/10/26 15:21:13 1.55
+++ www/errata34.html 2014/02/27 17:26:45 1.56
@@ -57,7 +57,8 @@
5.1,
5.2,
5.3,
-5.4.
+5.4,
+5.5.
@@ -200,7 +201,7 @@
024: SECURITY FIX: June 10, 2004
-As
+As
disclosed
by Thomas Walpuski
isakmpd(8)
@@ -230,7 +231,7 @@
has established a cross-realm trust with their realm. The flaw is due to
inadequate checking of the "transited" field in a Kerberos request. For
more details see
-Heimdal's announcement.
+Heimdal's announcement.
@@ -352,7 +353,7 @@
A source code patch exists which remedies the problem.
-010: SECURITY FIX: February 5, 2004
+010: SECURITY FIX: February 5, 2004
A reference counting bug exists in the
shmat(2)
system call that could be used by an attacker to write to kernel memory
@@ -362,7 +363,7 @@
A source code patch exists which remedies the problem.
-009: SECURITY FIX: January 13, 2004
+009: SECURITY FIX: January 13, 2004
Several message handling flaws in
isakmpd(8)
have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also
@@ -385,7 +386,7 @@
007: RELIABILITY FIX: November 20, 2003
-It is possible for a local user to cause a crash via
+It is possible for a local user to cause a crash via
sysctl(3) with certain arguments.
@@ -513,9 +514,9 @@
-
+
www@openbsd.org
-
$OpenBSD: errata34.html,v 1.55 2013/10/26 15:21:13 deraadt Exp $
+
$OpenBSD: errata34.html,v 1.56 2014/02/27 17:26:45 deraadt Exp $