OpenBSD Journal

[Patch 016] OpenSSL NULL-pointer dereference vulnerability

Contributed by jose on from the coding-mistakes dept.

Victor Sahlstedt writes: " http://marc.theaimsgroup.com/?l=openbsd-security-announce&m=107956353825071&w=2 "

The problem is fixed in -current, 3.4-stable and 3.3-stable.

Patches are available at:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/016_openssl.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/021_openssl.patch

(Comments are closed)


Comments
  1. By Anonymous Coward () on

    hi there,

    in the openbsd patch is nothing told to run a make world (in contrast to the freebsd advisory[1]).

    is this save or are there any static linked applications with openssl in the base?

    [1] ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc

    Comments
    1. By Bruno Rohée () bruno@rohee.com on mailto:bruno@rohee.com

      And since nothing in the base system is linked statically with OpenSSL rebuilding the library is enough.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]