=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v retrieving revision 1.42 retrieving revision 1.43 diff -u -r1.42 -r1.43 --- www/errata32.html 2013/10/26 15:21:13 1.42 +++ www/errata32.html 2014/02/27 17:26:45 1.43 @@ -57,7 +57,8 @@ 5.1, 5.2, 5.3, -5.4. +5.4, +5.5.

@@ -92,7 +93,7 @@

  • 019: SECURITY FIX: September 24, 2003
    -Three cases of potential access to freed memory have been found in +Three cases of potential access to freed memory have been found in pf(4). At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    @@ -195,7 +196,7 @@

  • 007: SECURITY FIX: February 22, 2003
    -In +In ssl(8) an information leak can occur via timing by performing a MAC computation even if incorrect block cipher padding has been found, this is a countermeasure. Also, check for negative sizes in memory allocation routines.
    @@ -216,7 +217,7 @@

  • 005: SECURITY FIX: November 14, 2002
    -A buffer overflow in +A buffer overflow in named(8) could allow an attacker to execute code with the privileges of named. On OpenBSD, named runs as a non-root user in a chrooted environment @@ -324,9 +325,9 @@

    -OpenBSD +OpenBSD www@openbsd.org -
    $OpenBSD: errata32.html,v 1.42 2013/10/26 15:21:13 deraadt Exp $ +
    $OpenBSD: errata32.html,v 1.43 2014/02/27 17:26:45 deraadt Exp $