! 027: SECURITY FIX: March 31, 2003All architectures
A buffer overflow in the address parsing in
sendmail(8)
--- 85,91 ----
! 027: SECURITY FIX: March 31, 2003All architectures
A buffer overflow in the address parsing in
sendmail(8)
***************
*** 96,102 ****
A source code patch exists which remedies this problem.
! 026: SECURITY FIX: March 24, 2003All architectures
The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
on Kerberos v5 as well.
--- 94,100 ----
A source code patch exists which remedies this problem.
! 026: SECURITY FIX: March 24, 2003All architectures
The cryptographic weaknesses in the Kerberos v4 protocol can be exploited
on Kerberos v5 as well.
***************
*** 105,120 ****
A source code patch exists which remedies this problem.
! 025: SECURITY FIX: March 19, 2003All architectures
! OpenSSL is vulnerable to an extension of the ``Bleichenbacher'' attack designed
by Czech researchers Klima, Pokorny and Rosa.
A source code patch exists which remedies this problem.
! 024: SECURITY FIX: March 18, 2003All architectures
Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
--- 103,118 ----
A source code patch exists which remedies this problem.
! 025: SECURITY FIX: March 19, 2003All architectures
! OpenSSL is vulnerable to an extension of the "Bleichenbacher" attack designed
by Czech researchers Klima, Pokorny and Rosa.
A source code patch exists which remedies this problem.
! 024: SECURITY FIX: March 18, 2003All architectures
Various SSL and TLS operations in OpenSSL are vulnerable to timing attacks.
***************
*** 122,128 ****
A source code patch exists which remedies this problem.
! 023: SECURITY FIX: March 5, 2003All architectures
A fix for an
lprm(1)
--- 120,126 ----
A source code patch exists which remedies this problem.
! 023: SECURITY FIX: March 5, 2003All architectures
A fix for an
lprm(1)
***************
*** 132,138 ****
A source code patch exists which remedies this problem.
! 022: SECURITY FIX: March 3, 2003All architectures
A buffer overflow in the envelope comments processing in
sendmail(8)
--- 130,136 ----
A source code patch exists which remedies this problem.
! 022: SECURITY FIX: March 3, 2003All architectures
A buffer overflow in the envelope comments processing in
sendmail(8)
***************
*** 141,147 ****
A source code patch exists which remedies this problem.
! 021: SECURITY FIX: February 23, 2003All architectures
In
ssl(8) an information leak can occur via timing by performing a MAC computation
--- 139,145 ----
A source code patch exists which remedies this problem.
! 021: SECURITY FIX: February 23, 2003All architectures
In
ssl(8) an information leak can occur via timing by performing a MAC computation
***************
*** 151,157 ****
A source code patch exists which fixes these two issues.
! 020: SECURITY FIX: January 20, 2003All architectures
A double free in
cvs(1)
--- 149,155 ----
A source code patch exists which fixes these two issues.
! 020: SECURITY FIX: January 20, 2003All architectures
A double free in
cvs(1)
***************
*** 164,170 ****
A source code patch exists which remedies this problem.
! 019: SECURITY FIX: November 14, 2002All architectures
A buffer overflow in
named(8)
--- 162,168 ----
A source code patch exists which remedies this problem.
! 019: SECURITY FIX: November 14, 2002All architectures
A buffer overflow in
named(8)
***************
*** 175,181 ****
A source code patch exists which remedies this problem.
! 018: SECURITY FIX: November 6, 2002All architectures
Incorrect argument checking in the
getrlimit(2)
--- 173,179 ----
A source code patch exists which remedies this problem.
! 018: SECURITY FIX: November 6, 2002All architectures
Incorrect argument checking in the
getrlimit(2)
***************
*** 184,190 ****
A source code patch exists which remedies this problem.
! 017: SECURITY FIX: November 6, 2002All architectures
An attacker can bypass the restrictions imposed by sendmail's restricted shell,
smrsh(8),
--- 182,188 ----
A source code patch exists which remedies this problem.
! 017: SECURITY FIX: November 6, 2002All architectures
An attacker can bypass the restrictions imposed by sendmail's restricted shell,
smrsh(8),
***************
*** 193,199 ****
A source code patch exists which remedies this problem.
! 016: SECURITY FIX: October 21, 2002All architectures
A buffer overflow can occur in the
kadmind(8)
--- 191,197 ----
A source code patch exists which remedies this problem.
! 016: SECURITY FIX: October 21, 2002All architectures
A buffer overflow can occur in the
kadmind(8)
***************
*** 202,208 ****
A source code patch exists which remedies this problem.
! 015: SECURITY FIX: October 2, 2002All architectures
Incorrect argument checking in the
setitimer(2) system call may allow an attacker to write to kernel memory.
--- 200,206 ----
A source code patch exists which remedies this problem.
! 015: SECURITY FIX: October 2, 2002All architectures
Incorrect argument checking in the
setitimer(2) system call may allow an attacker to write to kernel memory.
***************
*** 210,216 ****
A source code patch exists which remedies this problem.
! 014: SECURITY FIX: August 11, 2002All architectures
An insufficient boundary check in the
select(2)
--- 208,214 ----
A source code patch exists which remedies this problem.
! 014: SECURITY FIX: August 11, 2002All architectures
An insufficient boundary check in the
select(2)
***************
*** 220,226 ****
A source code patch exists which remedies this problem.
! 013: SECURITY FIX: July 30, 2002All architectures
Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the
ssl(8)
--- 218,224 ----
A source code patch exists which remedies this problem.
! 013: SECURITY FIX: July 30, 2002All architectures
Several remote buffer overflows can occur in the SSL2 server and SSL3 client of the
ssl(8)
***************
*** 233,239 ****
This is the second version of the patch.
! 012: SECURITY FIX: July 29, 2002All architectures
A buffer overflow can occur in the
xdr_array(3)
--- 231,237 ----
This is the second version of the patch.
! 012: SECURITY FIX: July 29, 2002All architectures
A buffer overflow can occur in the
xdr_array(3)
***************
*** 244,250 ****
This is the second version of the patch.
! 011: SECURITY FIX: July 29, 2002All architectures
A race condition exists in the
pppd(8)
--- 242,248 ----
This is the second version of the patch.
! 011: SECURITY FIX: July 29, 2002All architectures
A race condition exists in the
pppd(8)
***************
*** 253,259 ****
A source code patch exists which remedies this problem.
! 010: RELIABILITY FIX: July 5, 2002All architectures
Receiving IKE payloads out of sequence can cause
isakmpd(8) to crash.
--- 251,257 ----
A source code patch exists which remedies this problem.
! 010: RELIABILITY FIX: July 5, 2002All architectures
Receiving IKE payloads out of sequence can cause
isakmpd(8) to crash.
***************
*** 263,276 ****
This is the second version of the patch.
! 008: SECURITY FIX: June 26, 2002All architectures
A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd
module, leading to possible remote crash or exploit.
--- 261,274 ----
This is the second version of the patch.
! 008: SECURITY FIX: June 26, 2002All architectures
A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd
module, leading to possible remote crash or exploit.
***************
*** 278,291 ****
A source code patch exists which remedies this problem.
! 006: SECURITY FIX: June 24, 2002All architectures
All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation
error that can result in an integer overflow and privilege escalation.
--- 276,289 ----
A source code patch exists which remedies this problem.
! 006: SECURITY FIX: June 24, 2002All architectures
All versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation
error that can result in an integer overflow and privilege escalation.
***************
*** 294,300 ****
security advisory.
! 005: SECURITY FIX: June 19, 2002All architectures
A buffer overflow can occur during the interpretation of chunked
encoding in the http daemon, leading to possible remote crash or exploit.
--- 292,298 ----
security advisory.
! 005: SECURITY FIX: June 19, 2002All architectures
A buffer overflow can occur during the interpretation of chunked
encoding in the http daemon, leading to possible remote crash or exploit.
***************
*** 302,308 ****
A source code patch exists which remedies this problem.
! 004: SECURITY FIX: May 22, 2002All architectures
Under certain conditions, on systems using YP with netgroups in the
password database, it is possible that
--- 300,306 ----
A source code patch exists which remedies this problem.
! 004: SECURITY FIX: May 22, 2002All architectures
Under certain conditions, on systems using YP with netgroups in the
password database, it is possible that
***************
*** 315,321 ****
A source code patch exists which remedies this problem.
! 003: SECURITY FIX: May 8, 2002All architectures
A race condition exists where an attacker could fill the file descriptor
table and defeat the kernel's protection of fd slots 0, 1, and 2 for a
--- 313,319 ----
A source code patch exists which remedies this problem.
! 003: SECURITY FIX: May 8, 2002All architectures
A race condition exists where an attacker could fill the file descriptor
table and defeat the kernel's protection of fd slots 0, 1, and 2 for a
***************
*** 324,337 ****
A source code patch exists which remedies this problem.
! 001: SECURITY FIX: April 22, 2002All architectures
A local user can gain super-user privileges due to a buffer overflow
in sshd(8)
--- 322,335 ----
A source code patch exists which remedies this problem.
! 001: SECURITY FIX: April 22, 2002All architectures
A local user can gain super-user privileges due to a buffer overflow
in sshd(8)
***************
*** 346,351 ****