version 1.259, 2003/10/04 17:58:02 |
version 1.260, 2003/10/05 22:14:49 |
|
|
applications linked with ssl(3).</a> |
applications linked with ssl(3).</a> |
<li><a href=errata.html#pfnorm>September 24, 2003: |
<li><a href=errata.html#pfnorm>September 24, 2003: |
Access of freed memory in pf(4) could be used to |
Access of freed memory in pf(4) could be used to |
remotely panic a machine using scrub rules.</a |
remotely panic a machine using scrub rules.</a> |
<li><a href=errata.html#sendmail>September 17, 2003: |
<li><a href=errata.html#sendmail>September 17, 2003: |
A buffer overflow in the address parsing in |
A buffer overflow in the address parsing in |
sendmail(8) may allow an attacker to gain root privileges.</a> |
sendmail(8) may allow an attacker to gain root privileges.</a> |
|
|
applications linked with ssl(3). This does not affect OpenSSH.</a> |
applications linked with ssl(3). This does not affect OpenSSH.</a> |
<li><a href=errata32.html#pfnorm>September 24, 2003: |
<li><a href=errata32.html#pfnorm>September 24, 2003: |
Access of freed memory in pf(4) could be used to |
Access of freed memory in pf(4) could be used to |
remotely panic a machine using scrub rules.</a |
remotely panic a machine using scrub rules.</a> |
<li><a href=errata32.html#sendmail4>September 17, 2003: |
<li><a href=errata32.html#sendmail4>September 17, 2003: |
A buffer overflow in the address parsing in |
A buffer overflow in the address parsing in |
sendmail(8) may allow an attacker to gain root privileges.</a> |
sendmail(8) may allow an attacker to gain root privileges.</a> |