version 1.19, 2015/03/08 01:38:27 |
version 1.20, 2015/03/11 20:14:27 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="017_openssl"> |
|
<font color="#009000"><strong>017: SECURITY FIX: March 13, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
Don't permit TLS client connections to be downgraded to weak keys. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/017_openssl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="018_freetype"> |
|
<font color="#009000"><strong>018: SECURITY FIX: March 13, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
Another fix for buffer overflows in malformed fonts. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/018_freetype.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |