[BACK]Return to errata.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata.html between version 1.573 and 1.574

version 1.573, 2006/11/01 08:30:16 version 1.574, 2006/11/04 03:02:28
Line 75 
Line 75 
 <a name="vax"></a>  <a name="vax"></a>
 <ul>  <ul>
   
   <li><a name="systrace"></a>
   <font color="#009000"><strong>003: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   Fix for an integer overflow in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&amp;sektion=4">systrace(4)</a>'s
   STRIOCREPLACE support, found by
   Chris Evans. This could be exploited for DoS, limited kmem reads or local
   privilege escalation.
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/003_systrace.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="openssl2"></a>
   <font color="#009000"><strong>002: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   Several problems have been found in OpenSSL. While parsing certain invalid ASN.1
   structures an error condition is mishandled, possibly resulting in an infinite
   loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL
   pointer may be dereferenced in the SSL version 2 client code. In addition, many
   applications using OpenSSL do not perform any validation of the lengths of
   public keys being used.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>,
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a>
   <br>
   
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/002_openssl.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
   
   <li><a name="httpd"></a>
   <font color="#009000"><strong>001: SECURITY FIX: October 7, 2006</strong></font> &nbsp; <i>All architectures</i><br>
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&amp;sektion=8">httpd(8)</a>
   does not sanitize the Expect header from an HTTP request when it is
   reflected back in an error message, which might allow cross-site scripting (XSS)
   style attacks.
   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a>
   
   <br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/001_httpd.patch">
   A source code patch exists which remedies this problem</a>.<br>
   <p>
 </ul>  </ul>
   
 <br>  <br>

Legend:
Removed from v.1.573  
changed lines
  Added in v.1.574