version 1.312, 2001/02/22 17:55:41 |
version 1.313, 2001/03/02 05:21:36 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=ipsec_ah></a> |
|
<li><font color=#009000><strong>023: SECURITY FIX: Mar 2, 2001</strong></font><br> |
|
Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">A source code patch exists which remedies the problem.</a><br> |
<a name=sudo></a> |
<a name=sudo></a> |
<li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br> |
<li><font color=#009000><strong>021: SECURITY FIX: Feb 22, 2001</strong></font><br> |
There is a buffer overflow in |
There is a buffer overflow in |
|
|
<a name=i386></a> |
<a name=i386></a> |
<li><h3><font color=#e00000>i386</font></h3> |
<li><h3><font color=#e00000>i386</font></h3> |
<ul> |
<ul> |
|
<a name=userldt></a> |
|
<li><font color=#009000><strong>022: SECURITY FIX: Mar 2, 2001</strong></font><br> |
|
The <b>USER_LDT</b> kernel option allows an attacker to gain access to privledged area's of kernel memory. This option is not on by default. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/i386/022_userltd.patch">A source code patch exists which remedies the problem.</a><br> |
<a name=pms></a> |
<a name=pms></a> |
<li><font color=#009000><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br> |
<li><font color=#009000><strong>015: STABILITY FIX: Dec 22, 2000</strong></font><br> |
Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br> |
Some machines locked up while trying to use the mouse in console mode. This patch solves that problem.<br> |