[BACK]Return to errata35.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata35.html between version 1.50 and 1.51

version 1.50, 2014/03/31 16:02:48 version 1.51, 2014/04/10 03:15:34
Line 81 
Line 81 
 <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>  <font color="#009000"><strong>033: SECURITY FIX: April 28, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Fix a buffer overflow, memory leaks, and NULL pointer dereference in  Fix a buffer overflow, memory leaks, and NULL pointer dereference in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&sektion=1">cvs(1)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=cvs&amp;sektion=1">cvs(1)</a>
 . None of these issues are known to be exploitable.  . None of these issues are known to be exploitable.
 <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a>  <a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</a>
 .  .
Line 94 
Line 94 
 <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>  <font color="#009000"><strong>032: RELIABILITY FIX: April 4, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 Handle an edge condition in  Handle an edge condition in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&sektion=4">tcp(4)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcp&amp;sektion=4">tcp(4)</a>
 timestamps.  timestamps.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/032_tcp2.patch">
Line 165 
Line 165 
 <li><a name="httpd3"></a>  <li><a name="httpd3"></a>
 <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>  <font color="#009000"><strong>026: SECURITY FIX: January 12, 2005</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;apropos=0&amp;sektion=8&amp;manpath=OpenBSD+Current&amp;arch=i386&amp;format=html">httpd(8)</a>
 's mod_include module fails to properly validate the length of  's mod_include module fails to properly validate the length of
 user supplied tag strings prior to copying them to a local buffer,  user supplied tag strings prior to copying them to a local buffer,
 causing a buffer overflow.  causing a buffer overflow.
Line 371 
Line 371 
 <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>  <font color="#00900"><strong>009: SECURITY FIX: May 30, 2004</strong></font>
 &nbsp; <i>All architectures</i><br>  &nbsp; <i>All architectures</i><br>
 A flaw in the Kerberos V  A flaw in the Kerberos V
 <ahref="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a>
 server could result in the administrator of a Kerberos realm having  server could result in the administrator of a Kerberos realm having
 the ability to impersonate any principal in any other realm which  the ability to impersonate any principal in any other realm which
 has established a cross-realm trust with their realm. The flaw is due to  has established a cross-realm trust with their realm. The flaw is due to
Line 467 
Line 467 
 <p>  <p>
 </ul>  </ul>
 <p>  <p>
   
 </ul>  
   
 </body>  </body>
 </html>  </html>

Legend:
Removed from v.1.50  
changed lines
  Added in v.1.51