This bug was fixed in the package openssl - 0.9.8g-4ubuntu3.12
--------------- openssl (0.9.8g-4ubuntu3.12) hardy-security; urgency=low
* SECURITY UPDATE: TLS race condition leading to a buffer overflow and possible code execution. (LP: #676243) - ssl/t1_lib.c: stricter NULL/not-NULL checking - http://openssl.org/news/secadv_20101116.txt - CVE-2010-3864 -- Steve Beattie <email address hidden> Wed, 17 Nov 2010 09:02:39 -0800
This bug was fixed in the package openssl - 0.9.8g-4ubuntu3.12
--------------- 4ubuntu3. 12) hardy-security; urgency=low
openssl (0.9.8g-
* SECURITY UPDATE: TLS race condition leading to a buffer overflow and openssl. org/news/ secadv_ 20101116. txt
possible code execution. (LP: #676243)
- ssl/t1_lib.c: stricter NULL/not-NULL checking
- http://
- CVE-2010-3864
-- Steve Beattie <email address hidden> Wed, 17 Nov 2010 09:02:39 -0800