version 1.10, 2003/09/17 17:18:34 |
version 1.11, 2003/10/03 22:40:48 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=asn1></a> |
|
<li><font color="#009000"><strong>020: SECURITY FIX: October 1, 2003</strong></font><br> |
|
The use of certain ASN.1 encodings or malformed public keys may allow an |
|
attacker to mount a denial of service attack against applications linked with |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=3">ssl(3)</a>. |
|
This does not affect OpenSSH. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">A source code patch exists which remedies the problem</a>.<br> |
<a name=sendmail4></a> |
<a name=sendmail4></a> |
<li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br> |
<li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br> |
A buffer overflow in the address parsing in |
A buffer overflow in the address parsing in |