[BACK]Return to errata32.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata32.html between version 1.11 and 1.12

version 1.11, 2003/10/03 22:40:48 version 1.12, 2003/10/04 16:37:52
Line 61 
Line 61 
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.
 This does not affect OpenSSH.  This does not affect OpenSSH.
 <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">A source code patch exists which remedies the problem</a>.<br>  <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">A source code patch exists which remedies the problem</a>.<br>
   <a name=pfnorm></a>
   <li><font color="#009000"><strong>019: SECURITY FIX: October 1, 2003</strong></font><br>
   Three cases of potential access to freed memory have been found in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=4">pf</a>.
   At least one of them could be used to panic pf with active scrub rules remotely.
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br>
 <a name=sendmail4></a>  <a name=sendmail4></a>
 <li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br>  <li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br>
 A buffer overflow in the address parsing in  A buffer overflow in the address parsing in

Legend:
Removed from v.1.11  
changed lines
  Added in v.1.12