version 1.12, 2002/03/08 20:05:52 |
version 1.13, 2002/03/14 05:38:54 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=zlib></a> |
|
<li><font color=#009000><strong>022: RELIABILITY FIX: March 13, 2002</strong></font><br> |
|
Under some circumstances the zlib compression library can free dynamically |
|
allocated memory twice. This is not a security issue on OpenBSD since the BSD |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=free&sektion=3">free(3)</a> |
|
function detects this. |
|
There is also a kernel zlib component that may be used by pppd and IPSec. |
|
The feasibility of attacking the kernel this way is currently unknown. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/022_zlib.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=openssh></a> |
<a name=openssh></a> |
<li><font color=#009000><strong>021: SECURITY FIX: March 8, 2002</strong></font> |
<li><font color=#009000><strong>021: SECURITY FIX: March 8, 2002</strong></font> |
<br> |
<br> |