[Midnightbsd-cvs] www [640] trunk/index.html: update securtiy

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Sat Oct 3 14:25:23 EDT 2015


Revision: 640
          http://svnweb.midnightbsd.org/www/?rev=640
Author:   laffer1
Date:     2015-10-03 14:25:23 -0400 (Sat, 03 Oct 2015)
Log Message:
-----------
update securtiy

Modified Paths:
--------------
    trunk/index.html

Modified: trunk/index.html
===================================================================
--- trunk/index.html	2015-10-03 18:22:35 UTC (rev 639)
+++ trunk/index.html	2015-10-03 18:25:23 UTC (rev 640)
@@ -80,34 +80,41 @@
 		<div id="security" class="col-md-4">
 			<h2><a href="security/">Security ยป</a></h2>
 			<blockquote>
-				<p class="date">June 12, 2015</p>
+				<p class="date">September 30, 2015</p>
 
-				<p class="update">0.6.1 RELEASE <br>
-					OpenSSL Security update - new version is OpenSSL 0.9.8zg
+				<p class="update">0.7.1 RELEASE <br>
+					In rpcbind(8), netbuf structures are copied directly, which would result in
+										two netbuf structures that reference to one shared address buffer. When one
+										of the two netbuf structures is freed, access to the other netbuf structure
+										would result in an undefined result that may crash the rpcbind(8) daemon.
 				</p>
 
 				<p class="more">
-					<a href="security/index.html#a20150612">Read more ...</a>
+					<a href="security/index.html#a20150930">Read more ...</a>
 				</p>
 			</blockquote>
 			<blockquote>
-				<p class="date">March 19, 2015</p>
+				<p class="date">August 25, 2015</p>
 
 				<p class="update">
-					0.5.10 RELEASE <br> OpenSSL Security update <br> A malformed elliptic curve
-					private key file could cause a use-after-free condition in the d2i_ECPrivateKey
-					function. [CVE-2015-0209] <br> An attempt to compare ASN.1 boolean types will
-					cause the ASN1_TYPE_cmp function to crash with an invalid read. [CVE-2015-0286]
-					<br> Reusing a structure in ASN.1 parsing may allow an attacker to cause memory
-					corruption via an invalid write. [CVE-2015-0287] <br> The function X509_to_X509_REQ
-					will crash with a NULL pointer dereference if the certificate key is invalid.
-					[CVE-2015-0288] <br> The PKCS#7 parsing code does not handle missing outer
-					ContentInfo correctly. [CVE-2015-0289] <br> A malicious client can trigger an
-					OPENSSL_assert in servers that both support SSLv2 and enable export cipher
-					suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message. [CVE-2015-0293]
+				kernel:
+									fix a security issue on amd64 where the GS segment CPU register can be changed via
+									userland value in kernel mode by using an IRET with #SS or #NP exceptions.
+					<br>
+							<br><b>openssh</b>:
+									A programming error in the privileged monitor process of the sshd(8)
+									service may allow the username of an already-authenticated user to be
+									overwritten by the unprivileged child process.
+					<br>
+					<br> A use-after-free error in the privileged monitor process of he sshd(8)
+									service may be deterministically triggered by the actions of a
+									compromised unprivileged child process.
+					<br>
+					<br>A use-after-free error in the session multiplexing code in the sshd(8)
+									service may result in unintended termination of the connection.
 				</p>
 
-				<p class="more"><a href="security/index.html#a20150319">Read more ...</a></p>
+				<p class="more"><a href="security/index.html#a20150825">Read more ...</a></p>
 			</blockquote>
 		</div>
 



More information about the Midnightbsd-cvs mailing list