version 1.153, 2000/11/23 19:06:20 |
version 1.154, 2000/12/05 17:35:43 |
|
|
|
|
<h3><font color=#e00000>OpenBSD 2.8 Security Advisories</font></h3> |
<h3><font color=#e00000>OpenBSD 2.8 Security Advisories</font></h3> |
These are the OpenBSD 2.8 advisories -- all these problems are solved |
These are the OpenBSD 2.8 advisories -- all these problems are solved |
in <a href=anoncvs.html>OpenBSD current</a>. Obviously, all the |
in <a href=anoncvs.html>OpenBSD current</a> and the |
OpenBSD 2.7 advisories listed below are fixed in OpenBSD 2.8. |
<a href=anoncvs.html#using>patch branch</a>. |
|
|
<p> |
<p> |
<ul> |
<ul> |
<li>No security advisories for 2.8 as of yet. |
<li><a href=errata.html#ftpd>Dec 4, 2000: |
|
A single-byte buffer overflow exists in ftpd (patch included).</a> |
|
There are no known exploits for the bug at this time. |
</ul> |
</ul> |
|
|
<p> |
<p> |
|
|
|
|
<p> |
<p> |
<ul> |
<ul> |
|
<li><a href=errata27.html#ftpd>Dec 4, 2000: |
|
A single-byte buffer overflow exists in ftpd (patch included).</a> |
|
There are no known exploits for the bug at this time. |
<li><a href=errata27.html#sshforwarding>Nov 10, 2000: |
<li><a href=errata27.html#sshforwarding>Nov 10, 2000: |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
Hostile servers can force OpenSSH clients to do agent or X11 forwarding. |
(patch included)</a> |
(patch included)</a> |