===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata31.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -c -r1.88 -r1.89
*** www/errata31.html 2019/05/27 22:55:19 1.88
--- www/errata31.html 2019/05/28 16:32:41 1.89
***************
*** 84,212 ****
! -
! 027: SECURITY FIX: March 31, 2003
All architectures
! A buffer overflow in the address parsing in
! sendmail(8)
! may allow an attacker to gain root privileges.
!
A source code patch exists which remedies this problem.
!
-
! 026: SECURITY FIX: March 24, 2003
All architectures
! The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
! on Kerberos v5 as well.
!
!
A source code patch exists which remedies this problem.
!
-
! 025: SECURITY FIX: March 19, 2003
All architectures
! OpenSSL is vulnerable to an extension of the "Bleichenbacher" attack designed
! by Czech researchers Klima, Pokorny and Rosa.
!
!
A source code patch exists which remedies this problem.
!
-
! 024: SECURITY FIX: March 18, 2003
All architectures
! Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
!
!
A source code patch exists which remedies this problem.
!
-
! 023: SECURITY FIX: March 5, 2003
All architectures
! A fix for an
! lprm(1)
! bug made in 1996 contains an error that could lead to privilege escalation.
!
!
A source code patch exists which remedies this problem.
!
-
! 022: SECURITY FIX: March 3, 2003
All architectures
! A buffer overflow in the envelope comments processing in
! sendmail(8)
! may allow an attacker to gain root privileges.
!
! A source code patch exists which remedies this problem.
!
-
! 021: SECURITY FIX: February 23, 2003
All architectures
! In
! ssl(8) an information leak can occur via timing by performing a MAC computation
! even if incorrect block cipher padding has been found, this is a
! countermeasure. Also, check for negative sizes in memory allocation routines.
!
! A source code patch exists which fixes these two issues.
!
-
! 020: SECURITY FIX: January 20, 2003
All architectures
! A double free in
! cvs(1)
! could allow an attacker to execute code with the privileges of the
! user running cvs. This is only an issue when the cvs command is
! being run on a user's behalf as a different user. This means that,
! in most cases, the issue only exists for cvs configurations that use
! the pserver client/server connection method.
!
A source code patch exists which remedies this problem.
!
-
! 019: SECURITY FIX: November 14, 2002
All architectures
! A buffer overflow in
! named(8)
! could allow an attacker to execute code with the privileges of named.
! On OpenBSD, named runs as a non-root user in a chrooted environment
! which mitigates the effects of this bug.
!
A source code patch exists which remedies this problem.
!
-
! 018: SECURITY FIX: November 6, 2002
All architectures
! Incorrect argument checking in the
! getrlimit(2)
! system call may allow an attacker to crash the kernel.
!
A source code patch exists which remedies this problem.
!
-
! 017: SECURITY FIX: November 6, 2002
All architectures
! An attacker can bypass the restrictions imposed by sendmail's restricted shell,
! smrsh(8),
! and execute arbitrary commands with the privileges of his own account.
!
A source code patch exists which remedies this problem.
!
-
! 016: SECURITY FIX: October 21, 2002
All architectures
A buffer overflow can occur in the
! kadmind(8)
! daemon, leading to possible remote crash or exploit.
!
A source code patch exists which remedies this problem.
!
-
! 015: SECURITY FIX: October 2, 2002
All architectures
! Incorrect argument checking in the
! setitimer(2) system call may allow an attacker to write to kernel memory.
!
A source code patch exists which remedies this problem.
-
014: SECURITY FIX: August 11, 2002
All architectures
--- 84,226 ----