[BACK]Return to security.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/security.html between version 1.406 and 1.407

version 1.406, 2014/03/28 04:13:10 version 1.407, 2014/03/30 01:39:10
Line 220 
Line 220 
   
 <li><h3><font color="#e00000">Advisories</font></h3><p>  <li><h3><font color="#e00000">Advisories</font></h3><p>
   
 <li>  <li><a name="55"></a>
 <a name="54"></a>  <h3><font color="#e00000">OpenBSD 5.5 Security Advisories</font></h3>
   These are the OpenBSD 5.5 advisories -- all these problems are solved
   in <a href=anoncvs.html>OpenBSD current</a> and the
   <a href=stable.html>patch branch</a>.
   <p>
   
   <ul>
   <li><a href="errata55.html#001_icmp">March 15, 2014:
           Memory corruption happens during
           ICMP reflection handling.  ICMP reflection is disabled by default.</a>
   </ul>
   
   <li><a name="54"></a>
 <h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3>  <h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3>
 These are the OpenBSD 5.4 advisories -- all these problems are solved  These are the OpenBSD 5.4 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a> and the
Line 237 
Line 248 
 <li><a href="errata54.html#004_nginx">November 21, 2013:  <li><a href="errata54.html#004_nginx">November 21, 2013:
         Security restriction bypass in certain nginx(8) configurations</a>          Security restriction bypass in certain nginx(8) configurations</a>
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>).          (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>).
 <br>  
 <li><a href="errata54.html#006_libXfont">January 10, 2014:  <li><a href="errata54.html#006_libXfont">January 10, 2014:
         Buffer overflow in parsing of BDF font files</a>          Buffer overflow in parsing of BDF font files</a>
         (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>).          (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>).
 </ul>  </ul>
   
 <li>  <li><a name="53"></a>
 <a name="53"></a>  
   
 <h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3>  <h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3>
 These are the OpenBSD 5.3 advisories -- all these problems are solved  These are the OpenBSD 5.3 advisories -- all these problems are solved
 in <a href=anoncvs.html>OpenBSD current</a> and the  in <a href=anoncvs.html>OpenBSD current</a> and the
Line 269 
Line 277 
 OpenBSD 5.2 and earlier releases are not supported anymore. The following  OpenBSD 5.2 and earlier releases are not supported anymore. The following
 paragraphs only list advisories issued while they were maintained; these  paragraphs only list advisories issued while they were maintained; these
 releases are likely to be affected by the advisories for more recent releases.  releases are likely to be affected by the advisories for more recent releases.
 </b><p>  </b>
   <p>
   
 <li>  <li>
 <a name="52"></a>  <a name="52"></a>

Legend:
Removed from v.1.406  
changed lines
  Added in v.1.407