version 1.397, 2013/09/07 16:15:01 |
version 1.398, 2013/11/22 00:23:34 |
|
|
<a href="#51">5.1</a>, |
<a href="#51">5.1</a>, |
<br> |
<br> |
<a href="#52">5.2</a>, |
<a href="#52">5.2</a>, |
<a href="#53">5.3</a>. |
<a href="#53">5.3</a>, |
|
<a href="#54">5.4</a>. |
</td> |
</td> |
</tr> |
</tr> |
</table> |
</table> |
|
|
<li><h3><font color="#e00000">Advisories</font></h3><p> |
<li><h3><font color="#e00000">Advisories</font></h3><p> |
|
|
<li> |
<li> |
|
<a name="54"></a> |
|
|
|
<h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3> |
|
These are the OpenBSD 5.4 advisories -- all these problems are solved |
|
in <a href=anoncvs.html>OpenBSD current</a> and the |
|
<a href=stable.html>patch branch</a>. |
|
|
|
<p> |
|
<ul> |
|
<li><a href="errata54.html#002_sshgcm">November 7, 2013: |
|
Memory corruption in post-authentication sshd process if AES-GCM cipher |
|
is selected</a> |
|
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548">CVE-2013-4548</a>). |
|
<li><a href="errata54.html#004_nginx">November 21, 2013: |
|
Security restriction bypass in certain nginx(8) configurations</a> |
|
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>). |
|
<br> |
|
</ul> |
|
|
|
<li> |
<a name="53"></a> |
<a name="53"></a> |
|
|
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
|
|
|
|
<p> |
<p> |
<ul> |
<ul> |
None yet! |
<li><a href="errata53.html#009_sshgcm">November 7, 2013: |
|
Memory corruption in post-authentication sshd process if AES-GCM cipher |
|
is selected</a> |
|
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548">CVE-2013-4548</a>). |
|
<li><a href="errata53.html#011_nginx">November 21, 2013: |
|
Security restriction bypass in certain nginx(8) configurations</a> |
|
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>). |
</ul> |
</ul> |
|
|
<li> |
<li> |