version 1.7, 2010/03/08 21:53:37 |
version 1.8, 2010/03/12 13:35:51 |
|
|
<a name="zaurus"></a> |
<a name="zaurus"></a> |
|
|
<ul> |
<ul> |
|
<li><a name="013_ftpd"></a> |
|
<font color="#009000"><strong>013: RELIABILITY FIX: March 12, 2010</strong></font> <i>All architectures</i><br> |
|
Due to a null pointer dereference, it would be possible to crash ftpd when |
|
handling glob(3)'ing requests. This is non-exploitable. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/013_ftpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="006_openssl"></a> |
|
<font color="#009000"><strong>006: SECURITY FIX: March 12, 2010</strong></font> <i>All architectures</i><br> |
|
OpenSSL is susceptible to a buffer overflow due to a failure |
|
to check for NULL returns from bn_wexpand function calls. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/006_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="005_ptrace"></a> |
<li><a name="005_ptrace"></a> |
<font color="#009000"><strong>005: RELIABILITY FIX: January 29, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>005: RELIABILITY FIX: January 29, 2010</strong></font> <i>All architectures</i><br> |
By using ptrace(2) on an ancestor process, a loop in the process tree |
By using ptrace(2) on an ancestor process, a loop in the process tree |