=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v retrieving revision 1.42 retrieving revision 1.43 diff -c -r1.42 -r1.43 *** www/errata32.html 2013/10/26 15:21:13 1.42 --- www/errata32.html 2014/02/27 17:26:45 1.43 *************** *** 57,63 **** 5.1, 5.2, 5.3, ! 5.4.

--- 57,64 ---- 5.1, 5.2, 5.3, ! 5.4, ! 5.5.

*************** *** 92,98 ****

  • 019: SECURITY FIX: September 24, 2003
    ! Three cases of potential access to freed memory have been found in pf(4). At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    --- 93,99 ----

  • 019: SECURITY FIX: September 24, 2003
    ! Three cases of potential access to freed memory have been found in pf(4). At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    *************** *** 195,201 ****

  • 007: SECURITY FIX: February 22, 2003
    ! In ssl(8) an information leak can occur via timing by performing a MAC computation even if incorrect block cipher padding has been found, this is a countermeasure. Also, check for negative sizes in memory allocation routines.
    --- 196,202 ----

  • 007: SECURITY FIX: February 22, 2003
    ! In ssl(8) an information leak can occur via timing by performing a MAC computation even if incorrect block cipher padding has been found, this is a countermeasure. Also, check for negative sizes in memory allocation routines.
    *************** *** 216,222 ****

  • 005: SECURITY FIX: November 14, 2002
    ! A buffer overflow in named(8) could allow an attacker to execute code with the privileges of named. On OpenBSD, named runs as a non-root user in a chrooted environment --- 217,223 ----

  • 005: SECURITY FIX: November 14, 2002
    ! A buffer overflow in named(8) could allow an attacker to execute code with the privileges of named. On OpenBSD, named runs as a non-root user in a chrooted environment *************** *** 324,332 ****

    ! OpenBSD www@openbsd.org !
    $OpenBSD: errata32.html,v 1.42 2013/10/26 15:21:13 deraadt Exp $ --- 325,333 ----

    ! OpenBSD www@openbsd.org !
    $OpenBSD: errata32.html,v 1.43 2014/02/27 17:26:45 deraadt Exp $