[BACK]Return to security.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/security.html between version 1.259 and 1.260

version 1.259, 2003/10/04 17:58:02 version 1.260, 2003/10/05 22:14:49
Line 203 
Line 203 
         applications linked with ssl(3).</a>          applications linked with ssl(3).</a>
 <li><a href=errata.html#pfnorm>September 24, 2003:  <li><a href=errata.html#pfnorm>September 24, 2003:
         Access of freed memory in pf(4) could be used to          Access of freed memory in pf(4) could be used to
         remotely panic a machine using scrub rules.</a          remotely panic a machine using scrub rules.</a>
 <li><a href=errata.html#sendmail>September 17, 2003:  <li><a href=errata.html#sendmail>September 17, 2003:
         A buffer overflow in the address parsing in          A buffer overflow in the address parsing in
         sendmail(8) may allow an attacker to gain root privileges.</a>          sendmail(8) may allow an attacker to gain root privileges.</a>
Line 238 
Line 238 
         applications linked with ssl(3).  This does not affect OpenSSH.</a>          applications linked with ssl(3).  This does not affect OpenSSH.</a>
 <li><a href=errata32.html#pfnorm>September 24, 2003:  <li><a href=errata32.html#pfnorm>September 24, 2003:
         Access of freed memory in pf(4) could be used to          Access of freed memory in pf(4) could be used to
         remotely panic a machine using scrub rules.</a          remotely panic a machine using scrub rules.</a>
 <li><a href=errata32.html#sendmail4>September 17, 2003:  <li><a href=errata32.html#sendmail4>September 17, 2003:
         A buffer overflow in the address parsing in          A buffer overflow in the address parsing in
         sendmail(8) may allow an attacker to gain root privileges.</a>          sendmail(8) may allow an attacker to gain root privileges.</a>

Legend:
Removed from v.1.259  
changed lines
  Added in v.1.260