=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata.html,v retrieving revision 1.455 retrieving revision 1.456 diff -c -r1.455 -r1.456 *** www/errata.html 2003/10/04 16:53:48 1.455 --- www/errata.html 2003/10/04 17:54:20 1.456 *************** *** 59,72 **** The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). ! This does not affect OpenSSH. A source code patch exists which remedies the problem.
  • 006: SECURITY FIX: September 24, 2003
    Three cases of potential access to freed memory have been found in ! pf. ! At least one of them could be used to panic pf with active scrub rules remotely. A source code patch exists which remedies the problem.
  • 005: SECURITY FIX: September 17, 2003
    A buffer overflow in the address parsing in --- 59,74 ---- The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). ! This does not affect OpenSSH.
    A source code patch exists which remedies the problem.
    +

  • 006: SECURITY FIX: September 24, 2003
    Three cases of potential access to freed memory have been found in ! pf(4). ! At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    +

  • 005: SECURITY FIX: September 17, 2003
    A buffer overflow in the address parsing in *************** *** 197,203 ****
    OpenBSD www@openbsd.org !
    $OpenBSD: errata.html,v 1.455 2003/10/04 16:53:48 mcbride Exp $ --- 199,205 ----
    OpenBSD www@openbsd.org !
    $OpenBSD: errata.html,v 1.456 2003/10/04 17:54:20 margarida Exp $