version 1.412, 2002/07/30 16:51:32 |
version 1.413, 2002/08/11 17:22:38 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=scarg></a> |
|
<li><font color=#009000><strong>014: SECURITY FIX: August 11, 2002</strong></font><br> |
|
An insufficient boundary check in the |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=select&sektion=2">select(2)</a> |
|
and |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=poll&sektion=2">poll(2)</a> |
|
system calls allows an attacker to overwrite kernel memory and execute arbitrary |
|
code in kernel context.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/014_scarg.patch">A |
|
source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=ssl></a> |
<a name=ssl></a> |
<li><font color=#009000><strong>013: SECURITY FIX: July 30, 2002</strong></font><br> |
<li><font color=#009000><strong>013: SECURITY FIX: July 30, 2002</strong></font><br> |
Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the |
Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the |