version 1.50, 2014/03/31 16:02:48 |
version 1.51, 2014/04/10 03:15:34 |
|
|
<font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font> |
<font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fix a buffer overflow, memory leaks, and NULL pointer dereference in |
Fix a buffer overflow, memory leaks, and NULL pointer dereference in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a> |
. None of these issues are known to be exploitable. |
. None of these issues are known to be exploitable. |
<a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a> |
<a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a> |
. |
. |
|
|
<font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font> |
<font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Handle an edge condition in |
Handle an edge condition in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a> |
timestamps. |
timestamps. |
<br> |
<br> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch"> |
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch"> |
|
|
<li><a name="httpd3"></a> |
<li><a name="httpd3"></a> |
<font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font> |
<font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
's mod_include module fails to properly validate the length of |
's mod_include module fails to properly validate the length of |
user supplied tag strings prior to copying them to a local buffer, |
user supplied tag strings prior to copying them to a local buffer, |
causing a buffer overflow. |
causing a buffer overflow. |
|
|
<font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font> |
<font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A flaw in the Kerberos V |
A flaw in the Kerberos V |
<ahref="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a> |
server could result in the administrator of a Kerberos realm having |
server could result in the administrator of a Kerberos realm having |
the ability to impersonate any principal in any other realm which |
the ability to impersonate any principal in any other realm which |
has established a cross-realm trust with their realm. The flaw is due to |
has established a cross-realm trust with their realm. The flaw is due to |
|
|
<p> |
<p> |
</ul> |
</ul> |
<p> |
<p> |
|
|
</ul> |
|
|
|
</body> |
</body> |
</html> |
</html> |