version 1.47, 2014/10/02 14:34:45 |
version 1.48, 2015/02/14 04:36:51 |
|
|
|
|
<ul> |
<ul> |
|
|
<li><a name="ssh2"></a> |
<li id="ssh2"> |
<font color="#009000"><strong>020: SECURITY FIX: October 12, 2006</strong></font> |
<font color="#009000"><strong>020: SECURITY FIX: October 12, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found |
Fix 2 security bugs found in OpenSSH. A pre-authentication denial of service (found |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="systrace"></a> |
<li id="systrace"> |
<font color="#009000"><strong>019: SECURITY FIX: October 7, 2006</strong></font> |
<font color="#009000"><strong>019: SECURITY FIX: October 7, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Fix for an integer overflow in |
Fix for an integer overflow in |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="openssl2"></a> |
<li id="openssl2"> |
<font color="#009000"><strong>018: SECURITY FIX: October 7, 2006</strong></font> |
<font color="#009000"><strong>018: SECURITY FIX: October 7, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
Several problems have been found in OpenSSL. While parsing certain invalid ASN.1 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="httpd2"></a> |
<li id="httpd2"> |
<font color="#009000"><strong>017: SECURITY FIX: October 7, 2006</strong></font> |
<font color="#009000"><strong>017: SECURITY FIX: October 7, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a> |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="openssl"></a> |
<li id="openssl"> |
<font color="#009000"><strong>016: SECURITY FIX: September 8, 2006</strong></font> |
<font color="#009000"><strong>016: SECURITY FIX: September 8, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for |
Due to incorrect PKCS#1 v1.5 padding validation in OpenSSL, it is possible for |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="bind"></a> |
<li id="bind"> |
<font color="#009000"><strong>015: SECURITY FIX: September 8, 2006</strong></font> |
<font color="#009000"><strong>015: SECURITY FIX: September 8, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Two Denial of Service issues have been found with BIND. |
Two Denial of Service issues have been found with BIND. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="sppp"></a> |
<li id="sppp"> |
<font color="#009000"><strong>014: SECURITY FIX: September 2, 2006</strong></font> |
<font color="#009000"><strong>014: SECURITY FIX: September 2, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Due to the failure to correctly validate LCP configuration option lengths, |
Due to the failure to correctly validate LCP configuration option lengths, |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="isakmpd"></a> |
<li id="isakmpd"> |
<font color="#009000"><strong>013: SECURITY FIX: August 25, 2006</strong></font> |
<font color="#009000"><strong>013: SECURITY FIX: August 25, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A problem in |
A problem in |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="sem"></a> |
<li id="sem"> |
<font color="#009000"><strong>012: SECURITY FIX: August 25, 2006</strong></font> |
<font color="#009000"><strong>012: SECURITY FIX: August 25, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
It is possible to cause the kernel to panic when more than the default number of |
It is possible to cause the kernel to panic when more than the default number of |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="dhcpd"></a> |
<li id="dhcpd"> |
<font color="#009000"><strong>011: SECURITY FIX: August 25, 2006</strong></font> |
<font color="#009000"><strong>011: SECURITY FIX: August 25, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Due to an off-by-one error in |
Due to an off-by-one error in |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="sendmail3"></a> |
<li id="sendmail3"> |
<font color="#009000"><strong>010: SECURITY FIX: August 25, 2006</strong></font> |
<font color="#009000"><strong>010: SECURITY FIX: August 25, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A potential denial of service problem has been found in sendmail. A message |
A potential denial of service problem has been found in sendmail. A message |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="httpd"></a> |
<li id="httpd"> |
<font color="#009000"><strong>009: SECURITY FIX: July 30, 2006</strong></font> |
<font color="#009000"><strong>009: SECURITY FIX: July 30, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a>'s |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&sektion=8">httpd(8)</a>'s |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="sendmail2"></a> |
<li id="sendmail2"> |
<font color="#009000"><strong>008: SECURITY FIX: June 15, 2006</strong></font> |
<font color="#009000"><strong>008: SECURITY FIX: June 15, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A potential denial of service problem has been found in sendmail. A malformed MIME |
A potential denial of service problem has been found in sendmail. A malformed MIME |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="xorg"></a> |
<li id="xorg"> |
<font color="#009000"><strong>007: SECURITY FIX: May 2, 2006</strong></font> |
<font color="#009000"><strong>007: SECURITY FIX: May 2, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A security vulnerability has been found in the X.Org server -- |
A security vulnerability has been found in the X.Org server -- |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="sendmail"></a> |
<li id="sendmail"> |
<font color="#009000"><strong>006: SECURITY FIX: March 25, 2006</strong></font> |
<font color="#009000"><strong>006: SECURITY FIX: March 25, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A race condition has been reported to exist in the handling by sendmail of |
A race condition has been reported to exist in the handling by sendmail of |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="ssh"></a> |
<li id="ssh"> |
<font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font> |
<font color="#009000"><strong>005: SECURITY FIX: February 12, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |
Josh Bressers has reported a weakness in OpenSSH caused due to the insecure use of the |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="i386machdep"></a> |
<li id="i386machdep"> |
<font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font> |
<font color="#009000"><strong>004: RELIABILITY FIX: January 13, 2006</strong></font> |
<i>i386 architecture</i><br> |
<i>i386 architecture</i><br> |
Constrain |
Constrain |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="i386pmap"></a> |
<li id="i386pmap"> |
<font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font> |
<font color="#009000"><strong>003: RELIABILITY FIX: January 13, 2006</strong></font> |
<i>i386 architecture</i><br> |
<i>i386 architecture</i><br> |
Change the implementation of i386 W^X so that the "execute line" can move around. |
Change the implementation of i386 W^X so that the "execute line" can move around. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="fd"></a> |
<li id="fd"> |
<font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> |
<font color="#009000"><strong>002: SECURITY FIX: January 5, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
Do not allow users to trick suid programs into re-opening files via /dev/fd. |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
<li><a name="perl"></a> |
<li id="perl"> |
<font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font> |
<font color="#009000"><strong>001: SECURITY FIX: January 5, 2006</strong></font> |
<i>All architectures</i><br> |
<i>All architectures</i><br> |
A buffer overflow has been found in the Perl interpreter with the sprintf function which |
A buffer overflow has been found in the Perl interpreter with the sprintf function which |