[Midnightbsd-users] MidnightBSD 0.7.3 RELEASE
Lucas Holt
luke at foolishgames.com
Thu Jan 14 21:36:20 EST 2016
An update for MidnightBSD is now available from SVN, 0.7.3 RELEASE.
This release includes the following security fixes:
OpenSSL
The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. [CVE-2015-3194]
When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
memory. [CVE-2015-3195]
If PSK identity hints are received by a multi-threaded client then the values
are incorrectly updated in the parent SSL_CTX structure. [CVE-2015-3196]
linuxolator
A programming error in the Linux compatibility layer setgroups(2) system
call can lead to an unexpected results, such as overwriting random kernel
memory contents.
A programming error in the handling of Linux futex robust lists may result
in incorrect memory locations being accessed.
0.7.2 RELEASE
Fix a security issue with bsnmpd configuration file installation.
TCP MD5 signature denial of service
A programming error in processing a TCP connection with both TCP_MD5SIG
and TCP_NOOPT socket options may lead to kernel crash.
SCTP
A lack of proper input checks in the ICMPv6 processing in the SCTP stack
can lead to either a failed kernel assertion or to a NULL pointer
dereference. In either case, a kernel panic will follow.
In addition, users who run on the stable branch will also get an update for OpenSSH that
disables roaming capability in the client.
Lucas Holt
Luke at FoolishGames.com
________________________________________________________
MidnightBSD.org (Free OS)
JustJournal.com (Free blogging)
More information about the Midnightbsd-users
mailing list