version 1.13, 2009/10/28 20:23:42 |
version 1.14, 2009/11/26 10:10:35 |
|
|
<a name="zaurus"></a> |
<a name="zaurus"></a> |
|
|
<ul> |
<ul> |
|
<li><a name="010_openssl"></a> |
|
<font color="#009000"><strong>010: SECURITY FIX: November 26, 2009</strong></font> <i>All architectures</i><br> |
|
The SSL/TLS protocol is subject to man-in-the-middle attacks related to |
|
renegotiation (see CVE-2009-3555, draft-ietf-tls-renegotiation-00). |
|
OpenSSL permitted this protocol feature by default and had no way to |
|
disable it. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.5/common/010_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="009_getsockopt"></a> |
<li><a name="009_getsockopt"></a> |
<font color="#009000"><strong>009: RELIABILITY FIX: October 28, 2009</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>009: RELIABILITY FIX: October 28, 2009</strong></font> <i>All architectures</i><br> |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |