version 1.11, 2003/02/23 17:21:50 |
version 1.12, 2003/02/23 20:21:41 |
|
|
<li><font color=#009000><strong>021: SECURITY FIX: February 23, 2003</strong></font><br> |
<li><font color=#009000><strong>021: SECURITY FIX: February 23, 2003</strong></font><br> |
In |
In |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation |
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ssl&sektion=8">ssl(8)</a> an information leak can occur via timing by performing a MAC computation |
even if incorrrect block cipher padding has been found, this is a countermeasure. Also, check for negative sizes in memory allocation routines. |
even if incorrrect block cipher padding has been found, this is a |
|
countermeasure. Also, check for negative sizes in memory allocation routines.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/021_ssl.patch">A |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/021_ssl.patch">A |
source code patch exists which fixes these two issues</a>. |
source code patch exists which fixes these two issues</a>. |
<p> |
<p> |
|
|
user running cvs. This is only an issue when the cvs command is |
user running cvs. This is only an issue when the cvs command is |
being run on a user's behalf as a different user. This means that, |
being run on a user's behalf as a different user. This means that, |
in most cases, the issue only exists for cvs configurations that use |
in most cases, the issue only exists for cvs configurations that use |
the <em>pserver</em> client/server connection method. |
the <em>pserver</em> client/server connection method.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/020_cvs.patch">A |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/020_cvs.patch">A |
source code patch exists which remedies the problem</a>. |
source code patch exists which remedies the problem</a>. |
<p> |
<p> |