version 1.452, 2003/09/17 17:18:34 |
version 1.453, 2003/10/03 22:40:47 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=asn1></a> |
|
<li><font color="#009000"><strong>007: SECURITY FIX: October 1, 2003</strong></font><br> |
|
The use of certain ASN.1 encodings or malformed public keys may allow an |
|
attacker to mount a denial of service attack against applications linked with |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=3">ssl(3)</a>. |
|
This does not affect OpenSSH. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/007_asn1.patch">A source code patch exists which remedies the problem</a>.<br> |
<a name=sendmail></a> |
<a name=sendmail></a> |
<li><font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font><br> |
<li><font color="#009000"><strong>005: SECURITY FIX: September 17, 2003</strong></font><br> |
A buffer overflow in the address parsing in |
A buffer overflow in the address parsing in |