version 1.3, 2015/03/18 15:01:44 |
version 1.4, 2015/03/19 14:25:37 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="003_openssl"> |
|
<font color="#009000"><strong>003: SECURITY FIX: March 19, 2015</strong></font> |
|
<i>All architectures</i><br> |
|
Fix several crash causing defects from OpenSSL.<br> |
|
These include:<br> |
|
CVE-2015-0209 - Use After Free following d2i_ECPrivatekey error<br> |
|
CVE-2015-0286 - Segmentation fault in ASN1_TYPE_cmp<br> |
|
CVE-2015-0287 - ASN.1 structure reuse memory corruption<br> |
|
CVE-2015-0288 - X509_to_X509_REQ NULL pointer deref<br> |
|
CVE-2015-0289 - PKCS7 NULL pointer dereferences<br> |
|
<br> |
|
Several other issues did not apply or were already fixed.<br> |
|
For more information, see the |
|
<a href="https://www.openssl.org/news/secadv_20150319.txt">OpenSSL advisory</a>. |
|
<br> |
|
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/003_openssl.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |