version 1.9, 2010/03/12 14:51:33 |
version 1.10, 2010/03/31 17:05:43 |
|
|
<a name="zaurus"></a> |
<a name="zaurus"></a> |
|
|
<ul> |
<ul> |
<li><a name="013_ftpd"></a> |
<li><a name="008_kerberos"></a> |
|
<font color="#009000"><strong>008: RELIABILITY FIX: March 31, 2010</strong></font> <i>All architectures</i><br> |
|
When decrypting packets, the internal decryption functions were not |
|
paranoid enough in checking for underruns, which could potentially |
|
lead to crashes. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/008_kerberos.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
|
<li><a name="007_ftpd"></a> |
<font color="#009000"><strong>007: RELIABILITY FIX: March 12, 2010</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>007: RELIABILITY FIX: March 12, 2010</strong></font> <i>All architectures</i><br> |
Due to a null pointer dereference, it would be possible to crash ftpd when |
Due to a null pointer dereference, it would be possible to crash ftpd when |
handling glob(3)'ing requests. This is non-exploitable. |
handling glob(3)'ing requests. This is non-exploitable. |