version 1.20, 2014/04/09 21:09:26 |
version 1.21, 2014/04/12 17:39:57 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li><a name="008_openssl"></a> |
|
<font color="#009000"><strong>007: SECURITY FIX: April 12, 2014</strong></font> |
|
<i>All architectures</i><br> |
|
A use-after-free race condition in OpenSSL's read buffer may permit an attacker |
|
to inject data from one connection into another. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
</body> |
</body> |