version 1.574, 2006/11/04 03:02:28 |
version 1.575, 2006/11/04 21:28:18 |
|
|
<ul> |
<ul> |
|
|
<li><a name="systrace"></a> |
<li><a name="systrace"></a> |
<font color="#009000"><strong>003: SECURITY FIX: October 7, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>003: SECURITY FIX: November 4, 2006</strong></font> <i>All architectures</i><br> |
Fix for an integer overflow in |
Fix for an integer overflow in |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&sektion=4">systrace(4)</a>'s |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=systrace&sektion=4">systrace(4)</a>'s |
STRIOCREPLACE support, found by |
STRIOCREPLACE support, found by |
|
|
<p> |
<p> |
|
|
<li><a name="openssl2"></a> |
<li><a name="openssl2"></a> |
<font color="#009000"><strong>002: SECURITY FIX: October 7, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>002: SECURITY FIX: November 4, 2006</strong></font> <i>All architectures</i><br> |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
structures an error condition is mishandled, possibly resulting in an infinite |
structures an error condition is mishandled, possibly resulting in an infinite |
loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL |
loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL |
|
|
<p> |
<p> |
|
|
<li><a name="httpd"></a> |
<li><a name="httpd"></a> |
<font color="#009000"><strong>001: SECURITY FIX: October 7, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>001: SECURITY FIX: November 4, 2006</strong></font> <i>All architectures</i><br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a> |
does not sanitize the Expect header from an HTTP request when it is |
does not sanitize the Expect header from an HTTP request when it is |
reflected back in an error message, which might allow cross-site scripting (XSS) |
reflected back in an error message, which might allow cross-site scripting (XSS) |