[Midnightbsd-cvs] www [638] trunk/security/index.html: add 0.6.4 - 0.6.7

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Sat Oct 3 14:20:41 EDT 2015


Revision: 638
          http://svnweb.midnightbsd.org/www/?rev=638
Author:   laffer1
Date:     2015-10-03 14:20:41 -0400 (Sat, 03 Oct 2015)
Log Message:
-----------
add 0.6.4 - 0.6.7

Modified Paths:
--------------
    trunk/security/index.html

Modified: trunk/security/index.html
===================================================================
--- trunk/security/index.html	2015-10-03 18:14:27 UTC (rev 637)
+++ trunk/security/index.html	2015-10-03 18:20:41 UTC (rev 638)
@@ -32,6 +32,86 @@
 				<img src="../images/oxygen/security32.png" alt=" "/> Security Updates
 			</h2>
 
+			<blockquote class="bluebox" id="a20150825">
+				<h3>
+					August 25, 2015
+				</h3>
+
+				<p>
+					0.6.7 RELEASE
+
+				<p> kernel:
+					fix a security issue on amd64 where the GS segment CPU register can be changed via
+					userland value in kernel mode by using an IRET with #SS or #NP exceptions.
+
+				<p><b>openssh</b>:
+					A programming error in the privileged monitor process of the sshd(8)
+					service may allow the username of an already-authenticated user to be
+					overwritten by the unprivileged child process.
+
+				<p> A use-after-free error in the privileged monitor process of he sshd(8)
+					service may be deterministically triggered by the actions of a
+					compromised unprivileged child process.
+
+				<p> A use-after-free error in the session multiplexing code in the sshd(8)
+					service may result in unintended termination of the connection.
+			</blockquote>
+
+			<blockquote class="bluebox" id="a20150818">
+				<h3>
+					August 18, 2015
+				</h3>
+
+				<p>
+					0.6.6 RELEASE
+
+				<p> Fix a security vulnerabiity in the expat XML parser.
+			</blockquote>
+
+			<blockquote class="bluebox" id="a20150808">
+				<h3>
+					August 8, 2015
+				</h3>
+
+				<p>
+					0.6.5 RELEASE
+
+				<p> routed - fix a potential security issue where traffic from outside
+					the network can disrupt routing.
+			</blockquote>
+
+			<blockquote class="bluebox" id="a20150728">
+				<h3>
+					July 28, 2015
+				</h3>
+
+				<p>
+					0.6.4 RELEASE
+
+				<p> TCP Resassemly resource exhaustion bug:
+					There is a mistake with the introduction of VNET, which converted the
+					global limit on the number of segments that could belong to reassembly
+					queues into a per-VNET limit. Because mbufs are allocated from a
+					global pool, in the presence of a sufficient number of VNETs, the
+					total number of mbufs attached to reassembly queues can grow to the
+					total number of mbufs in the system, at which point all network
+					traffic would cease.
+					<br>Obtained from: FreeBSD 8
+
+				<p> OpenSSH
+
+				<p> Fix two security vulnerabilities:
+					OpenSSH clients does not correctly verify DNS SSHFP records when a server
+					offers a certificate. [CVE-2014-2653]
+
+				</p>
+
+				<p> OpenSSH servers which are configured to allow password authentication
+					using PAM (default) would allow many password attempts. A bug allows
+					MaxAuthTries to be bypassed. [CVE-2015-5600]
+				</p>
+			</blockquote>
+
 			<blockquote class="bluebox" id="a20150722">
 				<h3>
 					July 22, 2015



More information about the Midnightbsd-cvs mailing list