Return to errata56.html CVS log | Up to [local] / www |
version 1.22, 2015/03/18 08:02:48 | version 1.23, 2015/03/19 14:25:37 | ||
---|---|---|---|
|
|
||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||
<li id="023_libxfont"> | <li id="019_libxfont"> | ||
<font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font> | <font color="#009000"><strong>019: SECURITY FIX: March 18, 2015</strong></font> | ||
<i>All architectures</i><br> | <i>All architectures</i><br> | ||
Buffer overflows in libXfont | Buffer overflows in libXfont | ||
|
|
||
<a href="http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/">X.org advisory</a>. | <a href="http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/">X.org advisory</a>. | ||
<br> | <br> | ||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/019_libxfont.patch.sig"> | <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/019_libxfont.patch.sig"> | ||
A source code patch exists which remedies this problem.</a> | |||
<p> | |||
<li id="020_openssl"> | |||
<font color="#009000"><strong>020: SECURITY FIX: March 19, 2015</strong></font> | |||
<i>All architectures</i><br> | |||
Fix several crash causing defects from OpenSSL.<br> | |||
These include:<br> | |||
CVE-2015-0209 - Use After Free following d2i_ECPrivatekey error<br> | |||
CVE-2015-0286 - Segmentation fault in ASN1_TYPE_cmp<br> | |||
CVE-2015-0287 - ASN.1 structure reuse memory corruption<br> | |||
CVE-2015-0288 - X509_to_X509_REQ NULL pointer deref<br> | |||
CVE-2015-0289 - PKCS7 NULL pointer dereferences<br> | |||
<br> | |||
Several other issues did not apply or were already fixed.<br> | |||
For more information, see the | |||
<a href="https://www.openssl.org/news/secadv_20150319.txt">OpenSSL advisory</a>. | |||
<br> | |||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/020_openssl.patch.sig"> | |||
A source code patch exists which remedies this problem.</a> | A source code patch exists which remedies this problem.</a> | ||
<p> | <p> | ||