Return to errata32.html CVS log | Up to [local] / www |
version 1.11, 2003/10/03 22:40:48 | version 1.12, 2003/10/04 16:37:52 | ||
---|---|---|---|
|
|
||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=3">ssl(3)</a>. | <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=3">ssl(3)</a>. | ||
This does not affect OpenSSH. | This does not affect OpenSSH. | ||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">A source code patch exists which remedies the problem</a>.<br> | <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/020_asn1.patch">A source code patch exists which remedies the problem</a>.<br> | ||
<a name=pfnorm></a> | |||
<li><font color="#009000"><strong>019: SECURITY FIX: October 1, 2003</strong></font><br> | |||
Three cases of potential access to freed memory have been found in | |||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=4">pf</a>. | |||
At least one of them could be used to panic pf with active scrub rules remotely. | |||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/019_pfnorm.patch">A source code patch exists which remedies the problem</a>.<br> | |||
<a name=sendmail4></a> | <a name=sendmail4></a> | ||
<li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br> | <li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br> | ||
A buffer overflow in the address parsing in | A buffer overflow in the address parsing in |