version 1.375, 2002/03/08 19:50:52 |
version 1.376, 2002/03/14 05:38:54 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=zlib></a> |
|
<li><font color=#009000><strong>015: RELIABILITY FIX: March 13, 2002</strong></font><br> |
|
Under some circumstances the zlib compression library can free dynamically |
|
allocated memory twice. This is not a security issue on OpenBSD since the BSD |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=free&sektion=3">free(3)</a> |
|
function detects this. |
|
There is also a kernel zlib component that may be used by pppd and IPSec. |
|
The feasibility of attacking the kernel this way is currently unknown. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/015_zlib.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=openssh></a> |
<a name=openssh></a> |
<li><font color=#009000><strong>014: SECURITY FIX: March 8, 2002</strong></font><br> |
<li><font color=#009000><strong>014: SECURITY FIX: March 8, 2002</strong></font><br> |
A local user can gain super-user privileges due to an off-by-one check |
A local user can gain super-user privileges due to an off-by-one check |