Add information about the one most recent Security Advisory that applies

to 4.9 (SA 4:06 does not apply).
This commit is contained in:
Ken Smith 2004-03-30 05:28:34 +00:00
parent 669fb1f244
commit 37ba394427
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20444

View file

@ -108,6 +108,14 @@ been addressed on the FreeBSD 4.9-RELEASE security fix branch. Security advisory
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
<p>(17 Mar 2004) By performing a specially crafted SSL/TLS handshake with
an application that uses OpenSSL a null pointer may be dereferenced. This
may in turn cause the application to crash, resulting in a denial of service
attack. For more information see the Security Advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
target="_top">FreeBSD-SA-04:05</a> which contains more details and instructions
on how to patch existing systems.</p>
</div>
<div class="SECT1">