version 1.4, 2009/10/28 20:23:42 |
version 1.5, 2009/11/26 10:10:35 |
|
|
<a name="zaurus"></a> |
<a name="zaurus"></a> |
|
|
<ul> |
<ul> |
|
<li><a name="004_openssl"></a> |
|
<font color="#009000"><strong>004: SECURITY FIX: November 26, 2009</strong></font> <i>All architectures</i><br> |
|
The SSL/TLS protocol is subject to man-in-the-middle attacks related to |
|
renegotiation (see CVE-2009-3555, draft-ietf-tls-renegotiation-00). |
|
OpenSSL permitted this protocol feature by default and had no way to |
|
disable it. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="003_getsockopt"></a> |
<li><a name="003_getsockopt"></a> |
<font color="#009000"><strong>003: RELIABILITY FIX: October 28, 2009</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>003: RELIABILITY FIX: October 28, 2009</strong></font> <i>All architectures</i><br> |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |
getsockopt(2) with any of IP_AUTH_LEVEL, IP_ESP_TRANS_LEVEL, IP_ESP_NETWORK_LEVEL, |