[Midnightbsd-cvs] www [638] trunk/security/index.html: add 0.6.4 - 0.6.7
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Sat Oct 3 14:20:41 EDT 2015
Revision: 638
http://svnweb.midnightbsd.org/www/?rev=638
Author: laffer1
Date: 2015-10-03 14:20:41 -0400 (Sat, 03 Oct 2015)
Log Message:
-----------
add 0.6.4 - 0.6.7
Modified Paths:
--------------
trunk/security/index.html
Modified: trunk/security/index.html
===================================================================
--- trunk/security/index.html 2015-10-03 18:14:27 UTC (rev 637)
+++ trunk/security/index.html 2015-10-03 18:20:41 UTC (rev 638)
@@ -32,6 +32,86 @@
<img src="../images/oxygen/security32.png" alt=" "/> Security Updates
</h2>
+ <blockquote class="bluebox" id="a20150825">
+ <h3>
+ August 25, 2015
+ </h3>
+
+ <p>
+ 0.6.7 RELEASE
+
+ <p> kernel:
+ fix a security issue on amd64 where the GS segment CPU register can be changed via
+ userland value in kernel mode by using an IRET with #SS or #NP exceptions.
+
+ <p><b>openssh</b>:
+ A programming error in the privileged monitor process of the sshd(8)
+ service may allow the username of an already-authenticated user to be
+ overwritten by the unprivileged child process.
+
+ <p> A use-after-free error in the privileged monitor process of he sshd(8)
+ service may be deterministically triggered by the actions of a
+ compromised unprivileged child process.
+
+ <p> A use-after-free error in the session multiplexing code in the sshd(8)
+ service may result in unintended termination of the connection.
+ </blockquote>
+
+ <blockquote class="bluebox" id="a20150818">
+ <h3>
+ August 18, 2015
+ </h3>
+
+ <p>
+ 0.6.6 RELEASE
+
+ <p> Fix a security vulnerabiity in the expat XML parser.
+ </blockquote>
+
+ <blockquote class="bluebox" id="a20150808">
+ <h3>
+ August 8, 2015
+ </h3>
+
+ <p>
+ 0.6.5 RELEASE
+
+ <p> routed - fix a potential security issue where traffic from outside
+ the network can disrupt routing.
+ </blockquote>
+
+ <blockquote class="bluebox" id="a20150728">
+ <h3>
+ July 28, 2015
+ </h3>
+
+ <p>
+ 0.6.4 RELEASE
+
+ <p> TCP Resassemly resource exhaustion bug:
+ There is a mistake with the introduction of VNET, which converted the
+ global limit on the number of segments that could belong to reassembly
+ queues into a per-VNET limit. Because mbufs are allocated from a
+ global pool, in the presence of a sufficient number of VNETs, the
+ total number of mbufs attached to reassembly queues can grow to the
+ total number of mbufs in the system, at which point all network
+ traffic would cease.
+ <br>Obtained from: FreeBSD 8
+
+ <p> OpenSSH
+
+ <p> Fix two security vulnerabilities:
+ OpenSSH clients does not correctly verify DNS SSHFP records when a server
+ offers a certificate. [CVE-2014-2653]
+
+ </p>
+
+ <p> OpenSSH servers which are configured to allow password authentication
+ using PAM (default) would allow many password attempts. A bug allows
+ MaxAuthTries to be bypassed. [CVE-2015-5600]
+ </p>
+ </blockquote>
+
<blockquote class="bluebox" id="a20150722">
<h3>
July 22, 2015
More information about the Midnightbsd-cvs
mailing list