version 1.562, 2006/09/08 20:35:11 |
version 1.563, 2006/09/09 03:04:22 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="openssl"></a> |
|
<font color="#009000"><strong>011: SECURITY FIX: September 8, 2006</strong></font> <i>All architectures</i><br> |
|
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for |
|
an attacker to construct an invalid signature which OpenSSL would accept as a |
|
valid PKCS#1 v1.5 signature. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/011_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="bind"></a> |
<li><a name="bind"></a> |
<font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font> <i>All architectures</i><br> |
Two Denial of Service issues have been found with BIND. |
Two Denial of Service issues have been found with BIND. |