version 1.7, 2002/11/06 23:37:17 |
version 1.8, 2002/11/15 01:58:33 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=named></a> |
|
<li><font color=#009000><strong>019: SECURITY FIX: November 14, 2002</strong></font><br> |
|
A buffer overflow in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&sektion=8">named(8)</a> |
|
could allow an attacker to execute code with the privileges of named. |
|
On OpenBSD, named runs as a non-root user in a chrooted environment |
|
which mitigates the affects of this bug.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/019_named.patch">A |
|
source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=kernresource></a> |
<a name=kernresource></a> |
<li><font color=#009000><strong>018: SECURITY FIX: November 6, 2002</strong></font><br> |
<li><font color=#009000><strong>018: SECURITY FIX: November 6, 2002</strong></font><br> |
Incorrect argument checking in the |
Incorrect argument checking in the |
|
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypto&sektion=3">crypto(3)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=crypto&sektion=3">crypto(3)</a> |
library, all of them being potentially remotely exploitable.<br> |
library, all of them being potentially remotely exploitable.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/013_ssl.patch">A source code patch exists which remedies the problem</a>. |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/013_ssl.patch">A source code patch exists which remedies the problem</a>. |
|
<br> |
|
This is the second version of the patch. |
<p> |
<p> |
<a name=xdr></a> |
<a name=xdr></a> |
<li><font color=#009000><strong>012: SECURITY FIX: July 29, 2002</strong></font><br> |
<li><font color=#009000><strong>012: SECURITY FIX: July 29, 2002</strong></font><br> |