version 1.406, 2014/03/28 04:13:10 |
version 1.407, 2014/03/30 01:39:10 |
|
|
|
|
<li><h3><font color="#e00000">Advisories</font></h3><p> |
<li><h3><font color="#e00000">Advisories</font></h3><p> |
|
|
<li> |
<li><a name="55"></a> |
<a name="54"></a> |
<h3><font color="#e00000">OpenBSD 5.5 Security Advisories</font></h3> |
|
These are the OpenBSD 5.5 advisories -- all these problems are solved |
|
in <a href=anoncvs.html>OpenBSD current</a> and the |
|
<a href=stable.html>patch branch</a>. |
|
<p> |
|
|
|
<ul> |
|
<li><a href="errata55.html#001_icmp">March 15, 2014: |
|
Memory corruption happens during |
|
ICMP reflection handling. ICMP reflection is disabled by default.</a> |
|
</ul> |
|
|
|
<li><a name="54"></a> |
<h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3> |
<h3><font color="#e00000">OpenBSD 5.4 Security Advisories</font></h3> |
These are the OpenBSD 5.4 advisories -- all these problems are solved |
These are the OpenBSD 5.4 advisories -- all these problems are solved |
in <a href=anoncvs.html>OpenBSD current</a> and the |
in <a href=anoncvs.html>OpenBSD current</a> and the |
|
|
<li><a href="errata54.html#004_nginx">November 21, 2013: |
<li><a href="errata54.html#004_nginx">November 21, 2013: |
Security restriction bypass in certain nginx(8) configurations</a> |
Security restriction bypass in certain nginx(8) configurations</a> |
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>). |
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547">CVE-2013-4547</a>). |
<br> |
|
<li><a href="errata54.html#006_libXfont">January 10, 2014: |
<li><a href="errata54.html#006_libXfont">January 10, 2014: |
Buffer overflow in parsing of BDF font files</a> |
Buffer overflow in parsing of BDF font files</a> |
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>). |
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462">CVE-2013-6462</a>). |
</ul> |
</ul> |
|
|
<li> |
<li><a name="53"></a> |
<a name="53"></a> |
|
|
|
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
These are the OpenBSD 5.3 advisories -- all these problems are solved |
These are the OpenBSD 5.3 advisories -- all these problems are solved |
in <a href=anoncvs.html>OpenBSD current</a> and the |
in <a href=anoncvs.html>OpenBSD current</a> and the |
|
|
OpenBSD 5.2 and earlier releases are not supported anymore. The following |
OpenBSD 5.2 and earlier releases are not supported anymore. The following |
paragraphs only list advisories issued while they were maintained; these |
paragraphs only list advisories issued while they were maintained; these |
releases are likely to be affected by the advisories for more recent releases. |
releases are likely to be affected by the advisories for more recent releases. |
</b><p> |
</b> |
|
<p> |
|
|
<li> |
<li> |
<a name="52"></a> |
<a name="52"></a> |