version 1.7, 2008/11/19 11:19:06 |
version 1.8, 2009/01/09 13:13:58 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="007_openssl"></a> |
|
<font color="#009000"><strong>007: SECURITY FIX: January 9, 2009</strong></font> <i>All architectures</i><br> |
|
The OpenSSL libraries did not correctly check the return value from |
|
certain verifiction functions, allowing validation to be bypassed and |
|
permitting a remote attacker to conduct a "man in the middle attack" |
|
against SSL/TLS connections if the server is configured with a DSA or ECDSA |
|
certificate. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="006_dhcpd"></a> |
<li><a name="006_dhcpd"></a> |
<font color="#009000"><strong>006: RELIABILITY FIX: November 19, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>006: RELIABILITY FIX: November 19, 2008</strong></font> <i>All architectures</i><br> |
Due to changes in the options handling this caused problems with some |
Due to changes in the options handling this caused problems with some |