===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -c -r1.74 -r1.75
*** www/errata32.html 2019/05/27 22:55:19 1.74
--- www/errata32.html 2019/05/28 16:32:42 1.75
***************
*** 84,179 ****
! -
! 021: RELIABILITY FIX: October 1, 2003
All architectures
! It is possible for a local user to cause a system panic by flooding it with spoofed ARP
! requests.
!
A source code patch exists which remedies this problem.
!
-
! 020: SECURITY FIX: October 1, 2003
All architectures
! The use of certain ASN.1 encodings or malformed public keys may allow an
! attacker to mount a denial of service attack against applications linked with
! ssl(3).
! This does not affect OpenSSH.
!
A source code patch exists which remedies this problem.
!
-
! 019: SECURITY FIX: September 24, 2003
All architectures
! Three cases of potential access to freed memory have been found in
! pf(4).
! At least one of them could be used to panic pf with active scrub rules remotely.
!
A source code patch exists which remedies this problem.
!
-
! 018: SECURITY FIX: September 17, 2003
All architectures
! A buffer overflow in the address parsing in
! sendmail(8)
! may allow an attacker to gain root privileges.
!
A source code patch exists which remedies this problem.
- NOTE: this is the second revision of the patch that fixes an additional
!
-
! 017: SECURITY FIX: September 16, 2003
All architectures
! All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error.
! It is unclear whether or not this bug is exploitable.
!
A source code patch exists which remedies this problem.
- NOTE: this is the second revision of the patch that fixes an additional
- problem.
!
-
! 016: SECURITY FIX: August 25, 2003
All architectures
! Fix for a potential security issue in
! sendmail(8)
! with respect to DNS maps. This only affects
! sendmail(8)
! configurations that use the "enhdnsbl"
! feature. The default OpenBSD
! sendmail(8)
! config does not use this.
!
A source code patch exists which remedies this problem.
!
-
! 015: SECURITY FIX: August 4, 2003
All architectures
! An off-by-one error exists in the C library function
! realpath(3).
! Since this same bug resulted in a root compromise in the wu-ftpd ftp server
! it is possible that this bug may allow an attacker to gain escalated privileges
! on OpenBSD.
!
! A source code patch exists which remedies this problem.
!
-
! 014: SECURITY FIX: March 31, 2003
All architectures
! A buffer overflow in the address parsing in
sendmail(8)
may allow an attacker to gain root privileges.
!
A source code patch exists which remedies this problem.
!
-
! 013: SECURITY FIX: March 24, 2003
All architectures
! The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
! on Kerberos v5 as well.
!
A source code patch exists which remedies this problem.
-
012: SECURITY FIX: March 19, 2003
All architectures
--- 84,212 ----