===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -r1.42 -r1.43
--- www/errata32.html 2013/10/26 15:21:13 1.42
+++ www/errata32.html 2014/02/27 17:26:45 1.43
@@ -57,7 +57,8 @@
5.1,
5.2,
5.3,
-5.4.
+5.4,
+5.5.
@@ -92,7 +93,7 @@
019: SECURITY FIX: September 24, 2003
-Three cases of potential access to freed memory have been found in
+Three cases of potential access to freed memory have been found in
pf(4).
At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
@@ -195,7 +196,7 @@
007: SECURITY FIX: February 22, 2003
-In
+In
ssl(8) an information leak can occur via timing by performing a MAC computation
even if incorrect block cipher padding has been found, this is a
countermeasure. Also, check for negative sizes in memory allocation routines.
@@ -216,7 +217,7 @@
005: SECURITY FIX: November 14, 2002
-A buffer overflow in
+A buffer overflow in
named(8)
could allow an attacker to execute code with the privileges of named.
On OpenBSD, named runs as a non-root user in a chrooted environment
@@ -324,9 +325,9 @@
-
+
www@openbsd.org
-
$OpenBSD: errata32.html,v 1.42 2013/10/26 15:21:13 deraadt Exp $
+
$OpenBSD: errata32.html,v 1.43 2014/02/27 17:26:45 deraadt Exp $