===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -c -r1.13 -r1.14
*** www/errata32.html 2003/10/04 16:53:48 1.13
--- www/errata32.html 2003/10/04 17:54:21 1.14
***************
*** 59,72 ****
The use of certain ASN.1 encodings or malformed public keys may allow an
attacker to mount a denial of service attack against applications linked with
ssl(3).
! This does not affect OpenSSH.
A source code patch exists which remedies the problem.
019: SECURITY FIX: September 24, 2003
Three cases of potential access to freed memory have been found in
! pf.
! At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
018: SECURITY FIX: September 17, 2003
A buffer overflow in the address parsing in
--- 59,74 ----
The use of certain ASN.1 encodings or malformed public keys may allow an
attacker to mount a denial of service attack against applications linked with
ssl(3).
! This does not affect OpenSSH.
A source code patch exists which remedies the problem.
+
019: SECURITY FIX: September 24, 2003
Three cases of potential access to freed memory have been found in
! pf(4).
! At least one of them could be used to panic pf with active scrub rules remotely.
A source code patch exists which remedies the problem.
+
018: SECURITY FIX: September 17, 2003
A buffer overflow in the address parsing in
***************
*** 316,322 ****
www@openbsd.org
!
$OpenBSD: errata32.html,v 1.13 2003/10/04 16:53:48 mcbride Exp $