===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/security.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -r1.257 -r1.258
--- www/security.html 2003/10/03 22:40:47 1.257
+++ www/security.html 2003/10/04 16:57:21 1.258
@@ -201,6 +201,9 @@
The use of certain ASN.1 encodings or malformed public keys may
allow an attacker to mount a denial of service attack against
applications linked with ssl(3).
+
October 1, 2003:
+ Access of freed memory in pf(4) could be used to
+ remotely panic a machine using scrub rules.September 17, 2003:
A buffer overflow in the address parsing in
sendmail(8) may allow an attacker to gain root privileges.
@@ -233,6 +236,9 @@
The use of certain ASN.1 encodings or malformed public keys may
allow an attacker to mount a denial of service attack against
applications linked with ssl(3). This does not affect OpenSSH.
+October 1, 2003:
+ Access of freed memory in pf(4) could be used to
+ remotely panic a machine using scrub rules.September 17, 2003:
A buffer overflow in the address parsing in
sendmail(8) may allow an attacker to gain root privileges.
@@ -311,8 +317,9 @@
OpenBSD 3.1 Security Advisories
These are the OpenBSD 3.1 advisories -- all these problems are solved
-in OpenBSD current and the
-patch branch.
+in OpenBSD current. The
+patch branch for 3.1 is no longer being maintained,
+you should update your machine.
@@ -415,8 +422,9 @@
OpenBSD 3.0 Security Advisories
These are the OpenBSD 3.0 advisories -- all these problems are solved
-in OpenBSD current and the
-patch branch.
+in OpenBSD current. The
+patch branch for 3.0 is no longer being maintained,
+you should update your machine.
@@ -524,9 +532,11 @@
OpenBSD 2.9 Security Advisories
These are the OpenBSD 2.9 advisories -- all these problems are solved
-in OpenBSD current and the
-patch branch.
+in OpenBSD current. The
+patch branch. for 2.9 is no longer being maintained,
+you should update your machine.
+