===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata.html,v
retrieving revision 1.455
retrieving revision 1.456
diff -c -r1.455 -r1.456
*** www/errata.html 2003/10/04 16:53:48 1.455
--- www/errata.html 2003/10/04 17:54:20 1.456
***************
*** 59,72 ****
The use of certain ASN.1 encodings or malformed public keys may allow an
attacker to mount a denial of service attack against applications linked with
ssl(3).
! This does not affect OpenSSH.
A source code patch exists which remedies the problem.
006: SECURITY FIX: September 24, 2003
Three cases of potential access to freed memory have been found in
! pf.
! At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
005: SECURITY FIX: September 17, 2003
A buffer overflow in the address parsing in
--- 59,74 ----
The use of certain ASN.1 encodings or malformed public keys may allow an
attacker to mount a denial of service attack against applications linked with
ssl(3).
! This does not affect OpenSSH.
A source code patch exists which remedies the problem.
+
006: SECURITY FIX: September 24, 2003
Three cases of potential access to freed memory have been found in
! pf(4).
! At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
+
005: SECURITY FIX: September 17, 2003
A buffer overflow in the address parsing in
***************
*** 197,203 ****
www@openbsd.org
!
$OpenBSD: errata.html,v 1.455 2003/10/04 16:53:48 mcbride Exp $