[BACK]Return to errata32.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata32.html between version 1.42 and 1.43

version 1.42, 2013/10/26 15:21:13 version 1.43, 2014/02/27 17:26:45
Line 57 
Line 57 
 <a href="errata51.html">5.1</a>,  <a href="errata51.html">5.1</a>,
 <a href="errata52.html">5.2</a>,  <a href="errata52.html">5.2</a>,
 <a href="errata53.html">5.3</a>,  <a href="errata53.html">5.3</a>,
 <a href="errata54.html">5.4</a>.  <a href="errata54.html">5.4</a>,
   <a href="errata55.html">5.5</a>.
 <br>  <br>
 <hr>  <hr>
   
Line 92 
Line 93 
 <p>  <p>
 <li><a name="pfnorm"></a>  <li><a name="pfnorm"></a>
 <font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font><br>  <font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font><br>
 Three cases of potential access to freed memory have been found in  Three cases of potential access to freed memory have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.
 At least one of them could be used to panic pf with active scrub rules remotely.<br>  At least one of them could be used to panic pf with active scrub rules remotely.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br>  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br>
Line 195 
Line 196 
 <p>  <p>
 <li><a name="ssl"></a>  <li><a name="ssl"></a>
 <font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font><br>  <font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font><br>
 In  In
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation
 even if incorrect block cipher padding has been found, this is a  even if incorrect block cipher padding has been found, this is a
 countermeasure. Also, check for negative sizes in memory allocation routines.<br>  countermeasure. Also, check for negative sizes in memory allocation routines.<br>
Line 216 
Line 217 
 <p>  <p>
 <li><a name="named"></a>  <li><a name="named"></a>
 <font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font><br>  <font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font><br>
 A buffer overflow in  A buffer overflow in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named(8)</a>
 could allow an attacker to execute code with the privileges of named.  could allow an attacker to execute code with the privileges of named.
 On OpenBSD, named runs as a non-root user in a chrooted environment  On OpenBSD, named runs as a non-root user in a chrooted environment
Line 324 
Line 325 
 <br>  <br>
   
 <hr>  <hr>
 <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>  <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>
 <a href="mailto:www@openbsd.org">www@openbsd.org</a>  <a href="mailto:www@openbsd.org">www@openbsd.org</a>
 <br><small>$OpenBSD$</small>  <br><small>$OpenBSD$</small>
   

Legend:
Removed from v.1.42  
changed lines
  Added in v.1.43