=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/security.html,v retrieving revision 1.257 retrieving revision 1.258 diff -c -r1.257 -r1.258 *** www/security.html 2003/10/03 22:40:47 1.257 --- www/security.html 2003/10/04 16:57:21 1.258 *************** *** 201,206 **** --- 201,209 ---- The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). +
  • October 1, 2003: + Access of freed memory in pf(4) could be used to + remotely panic a machine using scrub rules.September 17, 2003: A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges. *************** *** 233,238 **** --- 236,244 ---- The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). This does not affect OpenSSH. +
  • October 1, 2003: + Access of freed memory in pf(4) could be used to + remotely panic a machine using scrub rules.September 17, 2003: A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges. *************** *** 311,318 ****

    OpenBSD 3.1 Security Advisories

    These are the OpenBSD 3.1 advisories -- all these problems are solved ! in OpenBSD current and the ! patch branch.