version 1.10, 2003/01/21 03:47:10 |
version 1.11, 2003/02/23 17:21:50 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<li><h3><font color=#e00000>All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=ssl2></a> |
|
<li><font color=#009000><strong>021: SECURITY FIX: February 23, 2003</strong></font><br> |
|
In |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation |
|
even if incorrrect block cipher padding has been found, this is a countermeasure. Also, check for negative sizes in memory allocation routines. |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/021_ssl.patch">A |
|
source code patch exists which fixes these two issues</a>. |
|
<p> |
<a name=cvs></a> |
<a name=cvs></a> |
<li><font color=#009000><strong>020: SECURITY FIX: January 20, 2003</strong></font><br> |
<li><font color=#009000><strong>020: SECURITY FIX: January 20, 2003</strong></font><br> |
A double free in |
A double free in |