version 1.411, 2014/05/01 15:03:35 |
version 1.412, 2014/05/01 15:15:22 |
|
|
cause a null pointer dereference.</a> |
cause a null pointer dereference.</a> |
</ul> |
</ul> |
|
|
|
<br><p><b> |
|
OpenBSD 5.3 and earlier releases are not supported anymore. The following |
|
paragraphs only list advisories issued while they were maintained; these |
|
releases are likely to be affected by the advisories for more recent releases. |
|
</b> |
|
<p> |
|
|
<li><a name="53"></a> |
<li><a name="53"></a> |
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
<h3><font color="#e00000">OpenBSD 5.3 Security Advisories</font></h3> |
These are the OpenBSD 5.3 advisories -- all these problems are solved |
These are the OpenBSD 5.3 advisories -- all these problems are solved |
|
|
A use-after-free race condition in OpenSSL's read buffer may permit |
A use-after-free race condition in OpenSSL's read buffer may permit |
an attacker to inject data from one connection into another.</a> |
an attacker to inject data from one connection into another.</a> |
</ul> |
</ul> |
|
|
<br><p><b> |
|
OpenBSD 5.2 and earlier releases are not supported anymore. The following |
|
paragraphs only list advisories issued while they were maintained; these |
|
releases are likely to be affected by the advisories for more recent releases. |
|
</b> |
|
<p> |
|
|
|
<li> |
<li> |
<a name="52"></a> |
<a name="52"></a> |