[BACK]Return to errata34.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata34.html between version 1.72 and 1.73

version 1.72, 2016/02/20 14:18:42 version 1.73, 2016/03/21 05:46:20
Line 85 
Line 85 
 <font color="#009000"><strong>035: SECURITY FIX: December 13, 2004</strong></font>  <font color="#009000"><strong>035: SECURITY FIX: December 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 On systems running  On systems running
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 it is possible for a local user to cause kernel memory corruption  it is possible for a local user to cause kernel memory corruption
 and system panic by setting  and system panic by setting
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ipsec&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;format=html">ipsec(4)</a>  <a href="http://man.openbsd.org?query=ipsec&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;format=html">ipsec(4)</a>
 credentials on a socket.  credentials on a socket.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/035_pfkey.patch">
Line 98 
Line 98 
 <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>034: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in  Due to a bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>  <a href="http://man.openbsd.org?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>
 it is possible for pages such as  it is possible for pages such as
 <a href="http://lcamtuf.coredump.cx/mangleme/gallery/lynx_die1.html">this</a>  <a href="http://lcamtuf.coredump.cx/mangleme/gallery/lynx_die1.html">this</a>
 to cause  to cause
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>  <a href="http://man.openbsd.org?query=lynx&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">lynx(1)</a>
 to exhaust memory and then crash when parsing such pages.  to exhaust memory and then crash when parsing such pages.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/034_lynx.patch">
Line 111 
Line 111 
 <li id="pppd">  <li id="pppd">
 <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font>  <font color="#009000"><strong>033: RELIABILITY FIX: November 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>  <a href="http://man.openbsd.org?query=pppd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">pppd(8)</a>
 contains a bug that allows an attacker to crash his own connection, but it cannot  contains a bug that allows an attacker to crash his own connection, but it cannot
 be used to deny service to other users.  be used to deny service to other users.
 <br>  <br>
Line 132 
Line 132 
 <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font>  <font color="#009000"><strong>031: SECURITY FIX: September 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Eilko Bos reported that radius authentication, as implemented by  Eilko Bos reported that radius authentication, as implemented by
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=login_radius&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">login_radius(8)</a>,  <a href="http://man.openbsd.org?query=login_radius&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">login_radius(8)</a>,
 was not checking the shared secret used for replies sent by the radius server.  was not checking the shared secret used for replies sent by the radius server.
 This could allow an attacker to spoof a reply granting access to the  This could allow an attacker to spoof a reply granting access to the
 attacker.  Note that OpenBSD does not ship with radius authentication enabled.  attacker.  Note that OpenBSD does not ship with radius authentication enabled.
Line 157 
Line 157 
 <li id="httpd4">  <li id="httpd4">
 <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font>  <font color="#009000"><strong>029: SECURITY FIX: September 10, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 's mod_rewrite module can be made to write one zero byte in an arbitrary memory  's mod_rewrite module can be made to write one zero byte in an arbitrary memory
 position outside of a char array, causing a DoS or possibly buffer overflows.  position outside of a char array, causing a DoS or possibly buffer overflows.
 This would require enabling dbm for mod_rewrite and making use of a malicious  This would require enabling dbm for mod_rewrite and making use of a malicious
Line 173 
Line 173 
 As  As
 <a href="http://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>  <a href="http://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">reported</a>
 by Vafa Izadinia  by Vafa Izadinia
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=bridge&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">bridge(4)</a>  <a href="http://man.openbsd.org?query=bridge&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">bridge(4)</a>
 with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.  with IPsec processing enabled can be crashed remotely by a single ICMP echo traversing the bridge.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/028_bridge.patch">
Line 204 
Line 204 
 <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font>  <font color="#009000"><strong>025: SECURITY FIX: June 12, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple vulnerabilities have been found in  Multiple vulnerabilities have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 / mod_ssl.  / mod_ssl.
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</a>,
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</a>,  <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</a>,
Line 220 
Line 220 
 As  As
 <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>  <a href="http://seclists.org/lists/fulldisclosure/2004/Jun/0191.html">disclosed</a>
 by Thomas Walpuski  by Thomas Walpuski
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 is still vulnerable to unauthorized SA deletion.  An attacker can delete IPsec  is still vulnerable to unauthorized SA deletion.  An attacker can delete IPsec
 tunnels at will.  tunnels at will.
 <br>  <br>
Line 231 
Line 231 
 <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font>  <font color="#009000"><strong>023: SECURITY FIX: June 9, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Multiple remote vulnerabilities have been found in the  Multiple remote vulnerabilities have been found in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server that allow an attacker to crash the server or possibly execute arbitrary  server that allow an attacker to crash the server or possibly execute arbitrary
 code with the same privileges as the CVS server program.  code with the same privileges as the CVS server program.
 <br>  <br>
Line 242 
Line 242 
 <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font>  <font color="#00900"><strong>022: SECURITY FIX: May 30, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>  <a href="http://man.openbsd.org?query=kdc">kdc(8)</a>
 server could result in the administrator of a Kerberos realm having  server could result in the administrator of a Kerberos realm having
 the ability to impersonate any principal in any other realm which  the ability to impersonate any principal in any other realm which
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
Line 257 
Line 257 
 <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font>  <font color="#009000"><strong>021: SECURITY FIX: May 20, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A heap overflow in the  A heap overflow in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>
 server has been discovered that can be exploited by clients sending  server has been discovered that can be exploited by clients sending
 malformed requests, enabling these clients to run arbitrary code  malformed requests, enabling these clients to run arbitrary code
 with the same privileges as the CVS server program.  with the same privileges as the CVS server program.
Line 285 
Line 285 
 <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>018: RELIABILITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Under load "recent model"  Under load "recent model"
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>  <a href="http://man.openbsd.org?query=gdt&amp;apropos=0&amp;sektion=4&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">gdt(4)</a>
 controllers will lock up.  controllers will lock up.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/018_gdt.patch">
Line 295 
Line 295 
 <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font>  <font color="#009000"><strong>017: SECURITY FIX: May 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Pathname validation problems have been found in  Pathname validation problems have been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,  <a href="http://man.openbsd.org?query=cvs&amp;apropos=0&amp;sektion=1&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">cvs(1)</a>,
 allowing malicious clients to create files outside the repository, allowing  allowing malicious clients to create files outside the repository, allowing
 malicious servers to overwrite files outside the local CVS tree on  malicious servers to overwrite files outside the local CVS tree on
 the client and allowing clients to check out files outside the CVS  the client and allowing clients to check out files outside the CVS
Line 308 
Line 308 
 <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>016: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A missing check for a NULL-pointer dereference has been found in  A missing check for a NULL-pointer dereference has been found in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.  <a href="http://man.openbsd.org?query=ssl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">ssl(3)</a>.
 A remote attacker can use the bug to cause an OpenSSL application to crash;  A remote attacker can use the bug to cause an OpenSSL application to crash;
 this may lead to a denial of service.  this may lead to a denial of service.
 <br>  <br>
Line 319 
Line 319 
 <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font>  <font color="#009000"><strong>015: RELIABILITY FIX: March 17, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Defects in the payload validation and processing functions of  Defects in the payload validation and processing functions of
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 have been discovered.  An attacker could send malformed ISAKMP messages and  have been discovered.  An attacker could send malformed ISAKMP messages and
 cause isakmpd to crash or to loop endlessly.  This patch fixes these problems  cause isakmpd to crash or to loop endlessly.  This patch fixes these problems
 and removes some memory leaks.  and removes some memory leaks.
Line 331 
Line 331 
 <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font>  <font color="#009000"><strong>014: SECURITY FIX: March 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Due to a bug in the parsing of Allow/Deny rules for  Due to a bug in the parsing of Allow/Deny rules for
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)'s</a>  <a href="http://man.openbsd.org?query=httpd&amp;sektion=8">httpd(8)'s</a>
 access module, using IP addresses without a netmask on big endian 64-bit  access module, using IP addresses without a netmask on big endian 64-bit
 platforms causes the rules to fail to match. This only affects sparc64.  platforms causes the rules to fail to match. This only affects sparc64.
 <br>  <br>
Line 373 
Line 373 
 <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font>  <font color="#009000"><strong>010: SECURITY FIX: February 5, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A reference counting bug exists in the  A reference counting bug exists in the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>  <a href="http://man.openbsd.org?query=shmat&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;format=html">shmat(2)</a>
 system call that could be used by an attacker to write to kernel memory  system call that could be used by an attacker to write to kernel memory
 under certain circumstances.  under certain circumstances.
 <br>  <br>
Line 384 
Line 384 
 <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font>  <font color="#009000"><strong>009: SECURITY FIX: January 13, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Several message handling flaws in  Several message handling flaws in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>  <a href="http://man.openbsd.org?query=isakmpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">isakmpd(8)</a>
 have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also  have been reported by Thomas Walpuski. These allow an attacker to delete arbitrary SAs. The patch also
 includes a reliability fix for a filedescriptor leak that causes problems when a crypto card is  includes a reliability fix for a filedescriptor leak that causes problems when a crypto card is
 installed.  installed.
Line 397 
Line 397 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 An improper bounds check makes it possible for a local user to cause a crash  An improper bounds check makes it possible for a local user to cause a crash
 by passing the  by passing the
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=semctl&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">semctl(2)</a> and  <a href="http://man.openbsd.org?query=semctl&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">semctl(2)</a> and
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=semop&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">semop(2)</a> functions  <a href="http://man.openbsd.org?query=semop&amp;apropos=0&amp;sektion=2&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">semop(2)</a> functions
 certain arguments.  certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/008_sem.patch">
Line 408 
Line 408 
 <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font>  <font color="#009000"><strong>007: RELIABILITY FIX: November 20, 2003</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 It is possible for a local user to cause a crash via  It is possible for a local user to cause a crash via
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.  <a href="http://man.openbsd.org?query=sysctl&amp;apropos=0&amp;sektion=3&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">sysctl(3)</a> with certain arguments.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/007_uvm.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 417 
Line 417 
 <font color="#009000"><strong>006: SECURITY FIX: November 17, 2003</strong></font>  <font color="#009000"><strong>006: SECURITY FIX: November 17, 2003</strong></font>
 &nbsp; <i>i386 only</i><br>  &nbsp; <i>i386 only</i><br>
 It may be possible for a local user to overrun the stack in  It may be possible for a local user to overrun the stack in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>  <a href="http://man.openbsd.org?query=compat_ibcs2&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">compat_ibcs2(8)</a>.<br>
 ProPolice catches this, turning a potential privilege escalation into a denial  ProPolice catches this, turning a potential privilege escalation into a denial
 of service. iBCS2 emulation does not need to be enabled via  of service. iBCS2 emulation does not need to be enabled via
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sysctl&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">sysctl(8)</a>  <a href="http://man.openbsd.org?query=sysctl&amp;sektion=8&amp;apropos=0&amp;manpath=OpenBSD+Current&amp;arch=i386">sysctl(8)</a>
 for this to happen.  for this to happen.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch">
Line 439 
Line 439 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>  A user with write permission to <tt>httpd.conf</tt> or a <tt>.htaccess</tt>
 file can crash  file can crash
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>  <a href="http://man.openbsd.org?query=httpd&amp;sektion=8">httpd(8)</a>
 or potentially run arbitrary code as the user <tt>www</tt> (although it  or potentially run arbitrary code as the user <tt>www</tt> (although it
 is believed that ProPolice will prevent code execution).  is believed that ProPolice will prevent code execution).
 <br>  <br>
Line 459 
Line 459 
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 The use of certain ASN.1 encodings or malformed public keys may allow an  The use of certain ASN.1 encodings or malformed public keys may allow an
 attacker to mount a denial of service attack against applications linked with  attacker to mount a denial of service attack against applications linked with
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&amp;sektion=3">ssl(3)</a>.  <a href="http://man.openbsd.org?query=ssl&amp;sektion=3">ssl(3)</a>.
 This does not affect OpenSSH.<br>  This does not affect OpenSSH.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/002_asn1.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>

Legend:
Removed from v.1.72  
changed lines
  Added in v.1.73