BSDSec

deadsimple BSD Security Advisories and Announcements

MidnightBSD 0.7.3 RELEASE

An update for MidnightBSD is now available from SVN, 0.7.3 RELEASE. 

This release includes the following security fixes:

	OpenSSL

	The signature verification routines will crash with a NULL pointer dereference
	if presented with an ASN.1 signature using the RSA PSS algorithm and absent
	mask generation function parameter. [CVE-2015-3194]

	When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
	memory. [CVE-2015-3195]

	If PSK identity hints are received by a multi-threaded client then the values
	are incorrectly updated in the parent SSL_CTX structure.  [CVE-2015-3196]
	
	linuxolator

	A programming error in the Linux compatibility layer setgroups(2) system
	call can lead to an unexpected results, such as overwriting random kernel
	memory contents.

	A programming error in the handling of Linux futex robust lists may result
	in incorrect memory locations being accessed.

	0.7.2 RELEASE
	Fix a security issue with bsnmpd configuration file installation.

	TCP MD5 signature denial of service

        A programming error in processing a TCP connection with both TCP_MD5SIG
        and TCP_NOOPT socket options may lead to kernel crash.

        SCTP

        A lack of proper input checks in the ICMPv6 processing in the SCTP stack
        can lead to either a failed kernel assertion or to a NULL pointer
        dereference.  In either case, a kernel panic will follow.

In addition, users who run on the stable branch will also get an update for OpenSSH that 
disables roaming capability in the client.


Lucas Holt
Luke@FoolishGames.com
________________________________________________________
MidnightBSD.org (Free OS)
JustJournal.com (Free blogging)





_______________________________________________
Midnightbsd-security mailing list
Midnightbsd-security@midnightbsd.org
http://www.midnightbsd.org/mailman/listinfo/midnightbsd-security