===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -c -r1.42 -r1.43
*** www/errata32.html 2013/10/26 15:21:13 1.42
--- www/errata32.html 2014/02/27 17:26:45 1.43
***************
*** 57,63 ****
5.1,
5.2,
5.3,
! 5.4.
--- 57,64 ----
5.1,
5.2,
5.3,
! 5.4,
! 5.5.
***************
*** 92,98 ****
019: SECURITY FIX: September 24, 2003
! Three cases of potential access to freed memory have been found in
pf(4).
At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
--- 93,99 ----
019: SECURITY FIX: September 24, 2003
! Three cases of potential access to freed memory have been found in
pf(4).
At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
***************
*** 195,201 ****
007: SECURITY FIX: February 22, 2003
! In
ssl(8) an information leak can occur via timing by performing a MAC computation
even if incorrect block cipher padding has been found, this is a
countermeasure. Also, check for negative sizes in memory allocation routines.
--- 196,202 ----
007: SECURITY FIX: February 22, 2003
! In
ssl(8) an information leak can occur via timing by performing a MAC computation
even if incorrect block cipher padding has been found, this is a
countermeasure. Also, check for negative sizes in memory allocation routines.
***************
*** 216,222 ****
005: SECURITY FIX: November 14, 2002
! A buffer overflow in
named(8)
could allow an attacker to execute code with the privileges of named.
On OpenBSD, named runs as a non-root user in a chrooted environment
--- 217,223 ----
005: SECURITY FIX: November 14, 2002
! A buffer overflow in
named(8)
could allow an attacker to execute code with the privileges of named.
On OpenBSD, named runs as a non-root user in a chrooted environment
***************
*** 324,332 ****
!
www@openbsd.org
!
$OpenBSD: errata32.html,v 1.42 2013/10/26 15:21:13 deraadt Exp $