=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/security.html,v retrieving revision 1.257 retrieving revision 1.258 diff -u -r1.257 -r1.258 --- www/security.html 2003/10/03 22:40:47 1.257 +++ www/security.html 2003/10/04 16:57:21 1.258 @@ -201,6 +201,9 @@ The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). +
  • October 1, 2003: + Access of freed memory in pf(4) could be used to + remotely panic a machine using scrub rules.September 17, 2003: A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges. @@ -233,6 +236,9 @@ The use of certain ASN.1 encodings or malformed public keys may allow an attacker to mount a denial of service attack against applications linked with ssl(3). This does not affect OpenSSH. +
  • October 1, 2003: + Access of freed memory in pf(4) could be used to + remotely panic a machine using scrub rules.September 17, 2003: A buffer overflow in the address parsing in sendmail(8) may allow an attacker to gain root privileges. @@ -311,8 +317,9 @@

    OpenBSD 3.1 Security Advisories

    These are the OpenBSD 3.1 advisories -- all these problems are solved -in OpenBSD current and the -patch branch. +in OpenBSD current. The +patch branch for 3.1 is no longer being maintained, +you should update your machine.