MidnightBSD 0.5.3-RELEASE
27 October, 2014 by luke@foolishgames.com | midnightbsd
MidnightBSD 0.5.3-RELEASE is now available via subversion. Fix several security vulnerabilities in OpenSSL, routed, rtsold, and namei with respect to Capsicum sandboxes looking up nonexistent path names and leaking memory. OpenSSL update adds some workarounds for the recent poodle vulnerability reported by Google. The input path in routed(8) will accept queries from any source and attempt to answer them. However, the output path assumes that the destination address for the response is on a directly connected network. Due to a missing length check in the code that handles DNS parameters, a malformed router advertisement message can result in a stack buffer overflow in rtsold(8). In addition, we've released 0.5.2-RELEASE ISOs on the FTP server for both amd64 and i386. We plan to do rollup security releases periodically. Lucas Holt Luke@FoolishGames.com ________________________________________________________ MidnightBSD.org (Free OS) JustJournal.com (Free blogging) _______________________________________________ Midnightbsd-security mailing list Midnightbsd-security@midnightbsd.org http://www.midnightbsd.org/mailman/listinfo/midnightbsd-security