version 1.71, 2019/05/27 22:55:19 |
version 1.72, 2019/05/28 16:32:42 |
|
|
|
|
<ul> |
<ul> |
|
|
<li id="ssh2"> |
<li id="perl"> |
<strong>020: SECURITY FIX: October 12, 2006</strong> |
<strong>001: SECURITY FIX: January 5, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found |
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
by Tavis Ormandy) that would cause |
may be exploitable under certain conditions. |
<a href="https://man.openbsd.org/OpenBSD-3.8/sshd.8">sshd(8)</a> |
|
to spin until the login grace time expired. |
|
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition |
|
that could be exploited to perform a pre-authentication denial of service. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="systrace"> |
<li id="fd"> |
<strong>019: SECURITY FIX: October 7, 2006</strong> |
<strong>002: SECURITY FIX: January 5, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fix for an integer overflow in |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
<a href="https://man.openbsd.org/OpenBSD-3.8/systrace.4">systrace(4)</a>'s |
|
STRIOCREPLACE support, found by |
|
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
|
privilege escalation. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="openssl2"> |
<li id="i386pmap"> |
<strong>018: SECURITY FIX: October 7, 2006</strong> |
<strong>003: RELIABILITY FIX: January 13, 2006</strong> |
<i>All architectures</i><br> |
<i>i386 architecture</i><br> |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
Change the implementation of i386 W^X so that the "execute line" can move around. |
structures an error condition is mishandled, possibly resulting in an infinite |
Before it was limited to being either at 512MB (below which all code normally |
loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL |
lands) or at the top of the stack. Now the line can float as |
pointer may be dereferenced in the SSL version 2 client code. In addition, many |
<a href="https://man.openbsd.org/OpenBSD-3.8/mprotect.2">mprotect(2)</a> |
applications using OpenSSL do not perform any validation of the lengths of |
and |
public keys being used. |
<a href="https://man.openbsd.org/OpenBSD-3.8/mmap.2">mmap(2)</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</a>, |
requests need it to. This is now implemented using only GDT selectors |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</a>, |
instead of the LDT so that it is more robust as well. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="httpd2"> |
<li id="i386machdep"> |
<strong>017: SECURITY FIX: October 7, 2006</strong> |
<strong>004: RELIABILITY FIX: January 13, 2006</strong> |
|
<i>i386 architecture</i><br> |
|
Constrain |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a> |
|
so even root is blocked from accessing the ioports |
|
unless the machine is running at lower securelevels or with an open X11 aperture. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="ssh"> |
|
<strong>005: SECURITY FIX: February 12, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a> |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |
does not sanitize the Expect header from an HTTP request when it is |
<a href="https://man.openbsd.org/OpenBSD-3.8/system.3">system(3)</a> |
reflected back in an error message, which might allow cross-site scripting (XSS) |
function in |
style attacks. |
<a href="https://man.openbsd.org/OpenBSD-3.8/scp.1">scp(1)</a> |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
when performing copy operations using filenames that are supplied by the user from the command line. |
|
This can be exploited to execute shell commands with privileges of the user running |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/scp.1">scp(1)</a>. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="openssl"> |
<li id="sendmail"> |
<strong>016: SECURITY FIX: September 8, 2006</strong> |
<strong>006: SECURITY FIX: March 25, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for |
A race condition has been reported to exist in the handling by sendmail of |
an attacker to construct an invalid signature which OpenSSL would accept as a |
asynchronous signals. A remote attacker may be able to execute arbitrary code with the |
valid PKCS#1 v1.5 signature. |
privileges of the user running sendmail, typically root. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="bind"> |
<li id="xorg"> |
<strong>015: SECURITY FIX: September 8, 2006</strong> |
<strong>007: SECURITY FIX: May 2, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Two Denial of Service issues have been found with BIND. |
A security vulnerability has been found in the X.Org server -- |
An attacker who can perform recursive lookups on a DNS server and is able |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>. |
to send a sufficiently large number of recursive queries, or is able to |
Clients authorized to connect to the X server are able to crash it and to execute |
get the DNS server to return more than one SIG(covered) RRsets can stop |
malicious code within the X server. |
the functionality of the DNS service. |
|
An attacker querying an authoritative DNS server serving a RFC 2535 |
|
DNSSEC zone may be able to crash the DNS server. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="sppp"> |
<li id="sendmail2"> |
<strong>014: SECURITY FIX: September 2, 2006</strong> |
<strong>008: SECURITY FIX: June 15, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Due to the failure to correctly validate LCP configuration option lengths, |
A potential denial of service problem has been found in sendmail. A malformed MIME |
it is possible for an attacker to send LCP packets via an |
message could trigger excessive recursion which will lead to stack exhaustion. |
<a href="https://man.openbsd.org/OpenBSD-3.8/sppp.4">sppp(4)</a> |
This denial of service attack only affects delivery of mail from the queue and |
connection causing the kernel to panic. |
delivery of a malformed message. Other incoming mail is still accepted and |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
delivered. However, mail messages in the queue may not be reattempted if a |
|
malformed MIME message exists. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="isakmpd"> |
<li id="httpd"> |
<strong>013: SECURITY FIX: August 25, 2006</strong> |
<strong>009: SECURITY FIX: July 30, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem in |
<a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>'s |
<a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a> |
mod_rewrite has a potentially exploitable off-by-one buffer overflow. |
caused IPsec to run partly without replay protection. If |
The buffer overflow may result in a vulnerability which, in combination |
<a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a> |
with certain types of Rewrite rules in the web server configuration files, |
was acting as responder during SA negotiation, SA's with a replay window of size 0 were created. |
could be triggered remotely. The default install is not affected by the |
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
buffer overflow. CVE-2006-3747 |
replay counter. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="sem"> |
<li id="sendmail3"> |
<strong>012: SECURITY FIX: August 25, 2006</strong> |
<strong>010: SECURITY FIX: August 25, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
It is possible to cause the kernel to panic when more than the default number of |
A potential denial of service problem has been found in sendmail. A message |
sempahores have been allocated. |
with really long header lines could trigger a use-after-free bug causing |
|
sendmail to crash. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="sendmail3"> |
<li id="sem"> |
<strong>010: SECURITY FIX: August 25, 2006</strong> |
<strong>012: SECURITY FIX: August 25, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A potential denial of service problem has been found in sendmail. A message |
It is possible to cause the kernel to panic when more than the default number of |
with really long header lines could trigger a use-after-free bug causing |
sempahores have been allocated. |
sendmail to crash. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/010_sendmail3.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/012_sem.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="httpd"> |
<li id="isakmpd"> |
<strong>009: SECURITY FIX: July 30, 2006</strong> |
<strong>013: SECURITY FIX: August 25, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a>'s |
A problem in |
mod_rewrite has a potentially exploitable off-by-one buffer overflow. |
<a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a> |
The buffer overflow may result in a vulnerability which, in combination |
caused IPsec to run partly without replay protection. If |
with certain types of Rewrite rules in the web server configuration files, |
<a href="https://man.openbsd.org/OpenBSD-3.8/isakmpd.8">isakmpd(8)</a> |
could be triggered remotely. The default install is not affected by the |
was acting as responder during SA negotiation, SA's with a replay window of size 0 were created. |
buffer overflow. CVE-2006-3747 |
An attacker could reinject sniffed IPsec packets, which will be accepted without checking the |
|
replay counter. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/009_httpd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/013_isakmpd.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="sendmail2"> |
<li id="sppp"> |
<strong>008: SECURITY FIX: June 15, 2006</strong> |
<strong>014: SECURITY FIX: September 2, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A potential denial of service problem has been found in sendmail. A malformed MIME |
Due to the failure to correctly validate LCP configuration option lengths, |
message could trigger excessive recursion which will lead to stack exhaustion. |
it is possible for an attacker to send LCP packets via an |
This denial of service attack only affects delivery of mail from the queue and |
<a href="https://man.openbsd.org/OpenBSD-3.8/sppp.4">sppp(4)</a> |
delivery of a malformed message. Other incoming mail is still accepted and |
connection causing the kernel to panic. |
delivered. However, mail messages in the queue may not be reattempted if a |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4304">CVE-2006-4304</a> |
malformed MIME message exists. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/014_sppp.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="xorg"> |
<li id="bind"> |
<strong>007: SECURITY FIX: May 2, 2006</strong> |
<strong>015: SECURITY FIX: September 8, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A security vulnerability has been found in the X.Org server -- |
Two Denial of Service issues have been found with BIND. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</a>. |
An attacker who can perform recursive lookups on a DNS server and is able |
Clients authorized to connect to the X server are able to crash it and to execute |
to send a sufficiently large number of recursive queries, or is able to |
malicious code within the X server. |
get the DNS server to return more than one SIG(covered) RRsets can stop |
|
the functionality of the DNS service. |
|
An attacker querying an authoritative DNS server serving a RFC 2535 |
|
DNSSEC zone may be able to crash the DNS server. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/007_xorg.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/015_bind.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="sendmail"> |
<li id="openssl"> |
<strong>006: SECURITY FIX: March 25, 2006</strong> |
<strong>016: SECURITY FIX: September 8, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A race condition has been reported to exist in the handling by sendmail of |
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for |
asynchronous signals. A remote attacker may be able to execute arbitrary code with the |
an attacker to construct an invalid signature which OpenSSL would accept as a |
privileges of the user running sendmail, typically root. |
valid PKCS#1 v1.5 signature. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</a> |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/006_sendmail.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/016_openssl.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="ssh"> |
<li id="httpd2"> |
<strong>005: SECURITY FIX: February 12, 2006</strong> |
<strong>017: SECURITY FIX: October 7, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |
<a href="https://man.openbsd.org/OpenBSD-3.8/httpd.8">httpd(8)</a> |
<a href="https://man.openbsd.org/OpenBSD-3.8/system.3">system(3)</a> |
does not sanitize the Expect header from an HTTP request when it is |
function in |
reflected back in an error message, which might allow cross-site scripting (XSS) |
<a href="https://man.openbsd.org/OpenBSD-3.8/scp.1">scp(1)</a> |
style attacks. |
when performing copy operations using filenames that are supplied by the user from the command line. |
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918">CVE-2006-3918</a> |
This can be exploited to execute shell commands with privileges of the user running |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/scp.1">scp(1)</a>. |
|
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/005_ssh.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/017_httpd2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="i386machdep"> |
<li id="openssl2"> |
<strong>004: RELIABILITY FIX: January 13, 2006</strong> |
<strong>018: SECURITY FIX: October 7, 2006</strong> |
<i>i386 architecture</i><br> |
<i>All architectures</i><br> |
Constrain |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
<a href="https://man.openbsd.org/OpenBSD-3.8/i386/i386_set_ioperm.2">i386_set_ioperm(2)</a> |
structures an error condition is mishandled, possibly resulting in an infinite |
so even root is blocked from accessing the ioports |
loop. A buffer overflow exists in the SSL_get_shared_ciphers function. A NULL |
unless the machine is running at lower securelevels or with an open X11 aperture. |
pointer may be dereferenced in the SSL version 2 client code. In addition, many |
|
applications using OpenSSL do not perform any validation of the lengths of |
|
public keys being used. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</a> |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/004_i386machdep.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/018_openssl2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="i386pmap"> |
<li id="systrace"> |
<strong>003: RELIABILITY FIX: January 13, 2006</strong> |
<strong>019: SECURITY FIX: October 7, 2006</strong> |
<i>i386 architecture</i><br> |
|
Change the implementation of i386 W^X so that the "execute line" can move around. |
|
Before it was limited to being either at 512MB (below which all code normally |
|
lands) or at the top of the stack. Now the line can float as |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/mprotect.2">mprotect(2)</a> |
|
and |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/mmap.2">mmap(2)</a> |
|
requests need it to. This is now implemented using only GDT selectors |
|
instead of the LDT so that it is more robust as well. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/i386/003_i386pmap.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="fd"> |
|
<strong>002: SECURITY FIX: January 5, 2006</strong> |
|
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
Fix for an integer overflow in |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/systrace.4">systrace(4)</a>'s |
|
STRIOCREPLACE support, found by |
|
Chris Evans. This could be exploited for DoS, limited kmem reads or local |
|
privilege escalation. |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/002_fd.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/019_systrace.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li id="perl"> |
<li id="ssh2"> |
<strong>001: SECURITY FIX: January 5, 2006</strong> |
<strong>020: SECURITY FIX: October 12, 2006</strong> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found |
may be exploitable under certain conditions. |
by Tavis Ormandy) that would cause |
|
<a href="https://man.openbsd.org/OpenBSD-3.8/sshd.8">sshd(8)</a> |
|
to spin until the login grace time expired. |
|
An unsafe signal handler (found by Mark Dowd) that is vulnerable to a race condition |
|
that could be exploited to perform a pre-authentication denial of service. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</a> |
<br> |
<br> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"> |
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/020_ssh2.patch"> |
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|