[BACK]Return to errata34.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata34.html between version 1.55 and 1.56

version 1.55, 2013/10/26 15:21:13 version 1.56, 2014/02/27 17:26:45
Line 57 
Line 57 
 <a href="errata51.html">5.1</a>,  <a href="errata51.html">5.1</a>,
 <a href="errata52.html">5.2</a>,  <a href="errata52.html">5.2</a>,
 <a href="errata53.html">5.3</a>,  <a href="errata53.html">5.3</a>,
 <a href="errata54.html">5.4</a>.  <a href="errata54.html">5.4</a>,
   <a href="errata55.html">5.5</a>.
 <br>  <br>
 <hr>  <hr>
   
Line 200 
Line 201 
 <p>  <p>
 <li><a name="isakmpd3"></a>  <li><a name="isakmpd3"></a>
 <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font><br>  <font color="#009000"><strong>024: SECURITY FIX: June 10, 2004</strong></font><br>
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
 by Thomas Walpuski  by Thomas Walpuski
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
Line 230 
Line 231 
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
 inadequate checking of the "transited" field in a Kerberos request. For  inadequate checking of the "transited" field in a Kerberos request. For
 more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">  more details see <a href="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">
 Heimdal's announcement</a>.  Heimdal's announcement</a>.
 <br>  <br>
 <a  <a
 href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">  href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch">
Line 352 
Line 353 
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies the problem</a>.<br>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li><a name="sysvshm"></a>
 <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font><br>  <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font><br>
 A reference counting bug exists in the  A reference counting bug exists in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>
 system call that could be used by an attacker to write to kernel memory  system call that could be used by an attacker to write to kernel memory
Line 362 
Line 363 
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies the problem</a>.<br>
 <p>  <p>
 <li><a name="isakmpd"></a>  <li><a name="isakmpd"></a>
 <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font><br>  <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font><br>
 Several message handling flaws in  Several message handling flaws in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also  have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also
Line 385 
Line 386 
 <p>  <p>
 <li><a name="uvm"></a>  <li><a name="uvm"></a>
 <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font><br>  <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">
Line 513 
Line 514 
 <br>  <br>
   
 <hr>  <hr>
 <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>  <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>
 <a href="mailto:www@openbsd.org">www@openbsd.org</a>  <a href="mailto:www@openbsd.org">www@openbsd.org</a>
 <br><small>$OpenBSD$</small>  <br><small>$OpenBSD$</small>
   

Legend:
Removed from v.1.55  
changed lines
  Added in v.1.56