version 1.12, 2008/10/02 18:44:06 |
version 1.13, 2009/01/09 13:13:58 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="007_openssl"></a> |
|
<font color="#009000"><strong>007: SECURITY FIX: January 9, 2009</strong></font> <i>All architectures</i><br> |
|
The OpenSSL libraries did not correctly check the return value from |
|
certain verifiction functions, allowing validation to be bypassed and |
|
permitting a remote attacker to conduct a "man in the middle attack" |
|
against SSL/TLS connections if the server is configured with a DSA or ECDSA |
|
certificate. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="006_ndp"></a> |
<li><a name="006_ndp"></a> |
<font color="#009000"><strong>006: SECURITY FIX: October 2, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>006: SECURITY FIX: October 2, 2008</strong></font> <i>All architectures</i><br> |
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor |
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor |