version 1.384, 2010/03/12 13:36:03 |
version 1.385, 2010/04/14 14:47:08 |
|
|
<a href="#43">4.3</a>, |
<a href="#43">4.3</a>, |
<a href="#44">4.4</a>, |
<a href="#44">4.4</a>, |
<a href="#45">4.5</a>, |
<a href="#45">4.5</a>, |
<a href="#46">4.6</a>. |
<a href="#46">4.6</a>, |
|
<a href="#47">4.7</a>. |
</td> |
</td> |
</tr> |
</tr> |
</table> |
</table> |
|
|
<li><h3><font color="#e00000">Advisories</font></h3><p> |
<li><h3><font color="#e00000">Advisories</font></h3><p> |
|
|
<li> |
<li> |
|
<a name="47"></a> |
|
|
|
<h3><font color="#e00000">OpenBSD 4.7 Security Advisories</font></h3> |
|
These are the OpenBSD 4.7 advisories -- all these problems are solved |
|
in <a href=anoncvs.html>OpenBSD current</a> and the |
|
<a href=stable.html>patch branch</a>. |
|
|
|
<p> |
|
<ul> |
|
<li><a href="errata47.html#003_openssl">April 14, 2010: |
|
In TLS connections, certain incorrectly formatted records can |
|
cause an OpenSSL client or server to crash due to a read |
|
attempt at NULL.</a>. |
|
</ul> |
|
|
|
<li> |
<a name="46"></a> |
<a name="46"></a> |
|
|
<h3><font color="#e00000">OpenBSD 4.6 Security Advisories</font></h3> |
<h3><font color="#e00000">OpenBSD 4.6 Security Advisories</font></h3> |
|
|
|
|
<p> |
<p> |
<ul> |
<ul> |
|
<li><a href="errata46.html#010_openssl">April 14, 2010: |
|
In TLS connections, certain incorrectly formatted records can |
|
cause an OpenSSL client or server to crash due to a read |
|
attempt at NULL.</a>. |
<li><a href="errata46.html#006_openssl">March 12, 2010: |
<li><a href="errata46.html#006_openssl">March 12, 2010: |
OpenSSL is susceptible to a buffer overflow due to a failure |
OpenSSL is susceptible to a buffer overflow due to a failure |
to check for NULL returns from bn_wexpand function calls</a>. |
to check for NULL returns from bn_wexpand function calls</a>. |
|
|
|
|
<p> |
<p> |
<ul> |
<ul> |
<li><a href="errata46.html#012_openssl">March 12, 2010: |
<li><a href="errata45.html#016_openssl">April 14, 2010: |
|
In TLS connections, certain incorrectly formatted records can |
|
cause an OpenSSL client or server to crash due to a read |
|
attempt at NULL.</a>. |
|
<li><a href="errata45.html#012_openssl">March 12, 2010: |
OpenSSL is susceptible to a buffer overflow due to a failure |
OpenSSL is susceptible to a buffer overflow due to a failure |
to check for NULL returns from bn_wexpand function calls</a>. |
to check for NULL returns from bn_wexpand function calls</a>. |
<li><a href="errata45.html#010_openssl">November 26, 2009: |
<li><a href="errata45.html#010_openssl">November 26, 2009: |