[BACK]Return to errata33.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata33.html between version 1.47 and 1.48

version 1.47, 2013/10/26 15:21:13 version 1.48, 2014/02/27 17:26:45
Line 57 
Line 57 
 <a href="errata51.html">5.1</a>,  <a href="errata51.html">5.1</a>,
 <a href="errata52.html">5.2</a>,  <a href="errata52.html">5.2</a>,
 <a href="errata53.html">5.3</a>,  <a href="errata53.html">5.3</a>,
 <a href="errata54.html">5.4</a>.  <a href="errata54.html">5.4</a>,
   <a href="errata55.html">5.5</a>.
 <br>  <br>
 <hr>  <hr>
   
Line 154 
Line 155 
 A source code patch exists which remedies the problem</a>.<br>  A source code patch exists which remedies the problem</a>.<br>
 <p>  <p>
 <li><a name="sysvshm"></a>  <li><a name="sysvshm"></a>
 <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font><br>  <font color="#009000"><strong>015: SECURITY FIX: February 5, 2004</strong></font><br>
 A reference counting bug exists in the  A reference counting bug exists in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>
 system call that could be used by an attacker to write to kernel memory  system call that could be used by an attacker to write to kernel memory
Line 226 
Line 227 
 <p>  <p>
 <li><a name="pfnorm"></a>  <li><a name="pfnorm"></a>
 <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font><br>  <font color="#009000"><strong>006: SECURITY FIX: September 24, 2003</strong></font><br>
 Three cases of potential access to freed memory have been found in  Three cases of potential access to freed memory have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pf&amp;sektion=4">pf(4)</a>.
 At least one of them could be used to panic pf with active scrub rules remotely.<br>  At least one of them could be used to panic pf with active scrub rules remotely.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/006_pfnorm.patch">
Line 348 
Line 349 
 <br>  <br>
   
 <hr>  <hr>
 <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>  <a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenBSD></a>
 <a href="mailto:www@openbsd.org">www@openbsd.org</a>  <a href="mailto:www@openbsd.org">www@openbsd.org</a>
 <br><small>$OpenBSD$</small>  <br><small>$OpenBSD$</small>
   

Legend:
Removed from v.1.47  
changed lines
  Added in v.1.48