version 1.10, 2014/01/10 19:52:09 |
version 1.11, 2014/01/10 20:04:51 |
|
|
<p> |
<p> |
|
|
<li><a name="005_sha512"></a> |
<li><a name="005_sha512"></a> |
<font color="#009000"><strong>005: RELIABILITY FIX: </strong></font> <i>Strict alignment architectures</i><br> |
<font color="#009000"><strong>005: RELIABILITY FIX: Dec 19, 2013</strong></font> <i>Strict alignment architectures</i><br> |
In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of |
In OpenSSL, use of the SHA384 SSL/TLS ciphers may result in a crash of |
the application. The i386, amd64, vax and m68k platforms aren't |
the application. The i386, amd64, vax and m68k platforms aren't |
affected. |
affected. |
|
|
<p> |
<p> |
|
|
<li><a name="006_libXfont"></a> |
<li><a name="006_libXfont"></a> |
<font color="#009000"><strong>006: SECURITY FIX: </strong></font> <i>Buffer overflow in parsing of BDF font files</i><br> |
<font color="#009000"><strong>006: SECURITY FIX: Jan 10, 2014</strong></font> <i>Buffer overflow in parsing of BDF font files</i><br> |
A BDF font file containing a longer than expected string could overflow |
A BDF font file containing a longer than expected string could overflow |
a buffer on the stack in the X server. |
a buffer on the stack in the X server. |
This issue was assigned CVE-2013-6462. |
This issue was assigned CVE-2013-6462. |