version 1.396, 2002/06/22 20:27:09 |
version 1.397, 2002/06/25 02:33:32 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=sshd></a> |
|
<li><font color=#009000><strong>006: SECURITY FIX: June 24, 2002</strong></font><br> |
|
An (as yet) undisclosed bug exists in OpenSSH which a patch is not forthcoming |
|
for yet -- no patch exists yet!<br> |
|
However, upgrading to <a href="http://www.openssh.com/openbsd.html">OpenSSH 3.3</a> |
|
with the <strong>UsePrivilegeSeparation</strong> option enabled will block this |
|
problem.<br> |
|
All users are advised to update immediately, and keep an eye out for |
|
a upcoming OpenSSH 3.4 release on Monday containing a real fix. |
|
<p> |
<a name=httpd></a> |
<a name=httpd></a> |
<li><font color=#009000><strong>005: SECURITY FIX: June 19, 2002</strong></font><br> |
<li><font color=#009000><strong>005: SECURITY FIX: June 19, 2002</strong></font><br> |
A buffer overflow can occur during the interpretation of chunked |
A buffer overflow can occur during the interpretation of chunked |