=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v retrieving revision 1.13 retrieving revision 1.14 diff -c -r1.13 -r1.14 *** www/errata32.html 2003/10/04 16:53:48 1.13 --- www/errata32.html 2003/10/04 17:54:21 1.14 *************** *** 59,72 **** The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). ! This does not affect OpenSSH. A source code patch exists which remedies the problem.
  • 019: SECURITY FIX: September 24, 2003
    Three cases of potential access to freed memory have been found in ! pf. ! At least one of them could be used to panic pf with active scrub rules remotely. A source code patch exists which remedies the problem.
  • 018: SECURITY FIX: September 17, 2003
    A buffer overflow in the address parsing in --- 59,74 ---- The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). ! This does not affect OpenSSH.
    A source code patch exists which remedies the problem.
    +

  • 019: SECURITY FIX: September 24, 2003
    Three cases of potential access to freed memory have been found in ! pf(4). ! At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    +

  • 018: SECURITY FIX: September 17, 2003
    A buffer overflow in the address parsing in *************** *** 316,322 ****
    OpenBSD www@openbsd.org !
    $OpenBSD: errata32.html,v 1.13 2003/10/04 16:53:48 mcbride Exp $ --- 318,324 ----
    OpenBSD www@openbsd.org !
    $OpenBSD: errata32.html,v 1.14 2003/10/04 17:54:21 margarida Exp $