=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/errata32.html,v retrieving revision 1.13 retrieving revision 1.14 diff -u -r1.13 -r1.14 --- www/errata32.html 2003/10/04 16:53:48 1.13 +++ www/errata32.html 2003/10/04 17:54:21 1.14 @@ -59,14 +59,16 @@ The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). -This does not affect OpenSSH. +This does not affect OpenSSH.
A source code patch exists which remedies the problem.
+

  • 019: SECURITY FIX: September 24, 2003
    Three cases of potential access to freed memory have been found in -pf. -At least one of them could be used to panic pf with active scrub rules remotely. +pf(4). +At least one of them could be used to panic pf with active scrub rules remotely.
    A source code patch exists which remedies the problem.
    +

  • 018: SECURITY FIX: September 17, 2003
    A buffer overflow in the address parsing in @@ -316,7 +318,7 @@
    OpenBSD www@openbsd.org -
    $OpenBSD: errata32.html,v 1.13 2003/10/04 16:53:48 mcbride Exp $ +
    $OpenBSD: errata32.html,v 1.14 2003/10/04 17:54:21 margarida Exp $