version 1.42, 2013/10/26 15:21:13 |
version 1.43, 2014/02/27 17:26:45 |
|
|
<a href="errata51.html">5.1</a>, |
<a href="errata51.html">5.1</a>, |
<a href="errata52.html">5.2</a>, |
<a href="errata52.html">5.2</a>, |
<a href="errata53.html">5.3</a>, |
<a href="errata53.html">5.3</a>, |
<a href="errata54.html">5.4</a>. |
<a href="errata54.html">5.4</a>, |
|
<a href="errata55.html">5.5</a>. |
<br> |
<br> |
<hr> |
<hr> |
|
|
|
|
<p> |
<p> |
<li><a name="pfnorm"></a> |
<li><a name="pfnorm"></a> |
<font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font><br> |
<font color="#009000"><strong>019: SECURITY FIX: September 24, 2003</strong></font><br> |
Three cases of potential access to freed memory have been found in |
Three cases of potential access to freed memory have been found in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a>. |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&sektion=4">pf(4)</a>. |
At least one of them could be used to panic pf with active scrub rules remotely.<br> |
At least one of them could be used to panic pf with active scrub rules remotely.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br> |
|
|
<p> |
<p> |
<li><a name="ssl"></a> |
<li><a name="ssl"></a> |
<font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font><br> |
<font color="#009000"><strong>007: SECURITY FIX: February 22, 2003</strong></font><br> |
In |
In |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation |
even if incorrect block cipher padding has been found, this is a |
even if incorrect block cipher padding has been found, this is a |
countermeasure. Also, check for negative sizes in memory allocation routines.<br> |
countermeasure. Also, check for negative sizes in memory allocation routines.<br> |
|
|
<p> |
<p> |
<li><a name="named"></a> |
<li><a name="named"></a> |
<font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font><br> |
<font color="#009000"><strong>005: SECURITY FIX: November 14, 2002</strong></font><br> |
A buffer overflow in |
A buffer overflow in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&sektion=8">named(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&sektion=8">named(8)</a> |
could allow an attacker to execute code with the privileges of named. |
could allow an attacker to execute code with the privileges of named. |
On OpenBSD, named runs as a non-root user in a chrooted environment |
On OpenBSD, named runs as a non-root user in a chrooted environment |
|
|
<br> |
<br> |
|
|
<hr> |
<hr> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<a href="mailto:www@openbsd.org">www@openbsd.org</a> |
<br><small>$OpenBSD$</small> |
<br><small>$OpenBSD$</small> |
|
|