version 1.425, 2003/01/21 03:47:10 |
version 1.426, 2003/02/22 22:50:04 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=ssl></a> |
|
<li><font color=#009000><strong>007: SECURITY FIX: February 22, 2003</strong></font><br> |
|
An information leak can occur via timing by performing a MAC computation |
|
even if incorrrect block cipher padding has been found. This fix is a |
|
countermeasure against active attacks where the attacker has to distinguish |
|
between bad padding and a MAC verification error. (CAN-2003-0078). |
|
Also, check for negative sizes in memory allocation routines. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/007_ssl.patch">A |
|
source code patch exists which fixes these two issues</a>. |
|
<p> |
<a name=cvs></a> |
<a name=cvs></a> |
<li><font color=#009000><strong>006: SECURITY FIX: January 20, 2003</strong></font><br> |
<li><font color=#009000><strong>006: SECURITY FIX: January 20, 2003</strong></font><br> |
A double free in |
A double free in |