[BACK]Return to security.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/security.html between version 1.257 and 1.258

version 1.257, 2003/10/03 22:40:47 version 1.258, 2003/10/04 16:57:21
Line 201 
Line 201 
         The use of certain ASN.1 encodings or malformed public keys may          The use of certain ASN.1 encodings or malformed public keys may
         allow an attacker to mount a denial of service attack against          allow an attacker to mount a denial of service attack against
         applications linked with ssl(3).</a>          applications linked with ssl(3).</a>
   <li><a href=errata.html#pfnorm>October 1, 2003:
           Access of freed memory in pf(4) could be used to
           remotely panic a machine using scrub rules.</a
 <li><a href=errata.html#sendmail>September 17, 2003:  <li><a href=errata.html#sendmail>September 17, 2003:
         A buffer overflow in the address parsing in          A buffer overflow in the address parsing in
         sendmail(8) may allow an attacker to gain root privileges.</a>          sendmail(8) may allow an attacker to gain root privileges.</a>
Line 233 
Line 236 
         The use of certain ASN.1 encodings or malformed public keys may          The use of certain ASN.1 encodings or malformed public keys may
         allow an attacker to mount a denial of service attack against          allow an attacker to mount a denial of service attack against
         applications linked with ssl(3).  This does not affect OpenSSH.</a>          applications linked with ssl(3).  This does not affect OpenSSH.</a>
   <li><a href=errata32.html#pfnorm>October 1, 2003:
           Access of freed memory in pf(4) could be used to
           remotely panic a machine using scrub rules.</a
 <li><a href=errata32.html#sendmail4>September 17, 2003:  <li><a href=errata32.html#sendmail4>September 17, 2003:
         A buffer overflow in the address parsing in          A buffer overflow in the address parsing in
         sendmail(8) may allow an attacker to gain root privileges.</a>          sendmail(8) may allow an attacker to gain root privileges.</a>
Line 311 
Line 317 
   
 <h3><font color=#e00000>OpenBSD 3.1 Security Advisories</font></h3>  <h3><font color=#e00000>OpenBSD 3.1 Security Advisories</font></h3>
 These are the OpenBSD 3.1 advisories -- all these problems are solved  These are the OpenBSD 3.1 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a>. The
 <a href=stable.html>patch branch</a>.  <a href=stable.html>patch branch</a> for 3.1 is no longer being maintained,
   you should update your machine.
   
 <p>  <p>
 <ul>  <ul>
Line 415 
Line 422 
   
 <h3><font color=#e00000>OpenBSD 3.0 Security Advisories</font></h3>  <h3><font color=#e00000>OpenBSD 3.0 Security Advisories</font></h3>
 These are the OpenBSD 3.0 advisories -- all these problems are solved  These are the OpenBSD 3.0 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a>. The
 <a href=stable.html>patch branch</a>.  <a href=stable.html>patch branch</a> for 3.0 is no longer being maintained,
   you should update your machine.
   
 <p>  <p>
 <ul>  <ul>
Line 524 
Line 532 
   
 <h3><font color=#e00000>OpenBSD 2.9 Security Advisories</font></h3>  <h3><font color=#e00000>OpenBSD 2.9 Security Advisories</font></h3>
 These are the OpenBSD 2.9 advisories -- all these problems are solved  These are the OpenBSD 2.9 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a>. The
 <a href=stable.html>patch branch</a>.  <a href=stable.html>patch branch</a>. for 2.9 is no longer being maintained,
   you should update your machine.
   
   
 <p>  <p>
 <ul>  <ul>
 <li><a href=errata29.html#resolver>June 25, 2002:  <li><a href=errata29.html#resolver>June 25, 2002:
Line 601 
Line 611 
   
 <h3><font color=#e00000>OpenBSD 2.8 Security Advisories</font></h3>  <h3><font color=#e00000>OpenBSD 2.8 Security Advisories</font></h3>
 These are the OpenBSD 2.8 advisories -- all these problems are solved  These are the OpenBSD 2.8 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a>. The
 <a href=stable.html>patch branch</a>.  <a href=stable.html>patch branch</a>. for 2.8 is no longer being maintained,
   you should update your machine.
   
   
 <p>  <p>
 <ul>  <ul>

Legend:
Removed from v.1.257  
changed lines
  Added in v.1.258