Dear Concerned: Can you please confirm that OpenSSL branch 0.9.7 branch is not affected by:
* DTLS segmentation fault in dtls1_get_record (CVE-2014-3571 (CVE-2015-0206 * DTLS memory leak in dtls1_buffer_record (CVE-2015-0206) * no-ssl3 configuration sets method to NULL (CVE-2014-3569) * ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572) * RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204) * DH client certificates accepted without verification [Server] (CVE-2015-0205) * Certificate fingerprints can be modified (CVE-2014-8275) * Bignum squaring may produce incorrect results (CVE-2014-3570) Since we do not find any mention of 0.9.7 branch in advisory links. Please note that OpenSSL 0.9.7 is shipped with Solaris10. Thanks and Regards Allauddin Ahmad Sr. System Analyst-I | THPS TELUS Health and Payment Solutions 505 March Rd., Suite 450, Kanata, ON, K2K 3A4 T : (613) 576 2091 allauddin.ah...@telus.com<mailto:michael.sch...@telus.com> telushealth.com [cid:image001.jpg@01D0580F.9A788DD0] The information contained herein, including any attachments, is proprietary and confidential and is intended for the exclusive use of the addressee. It also may contain privileged information and/or personal information subject to privacy legislation. The authorized addressee of this information, by its retention and use, agrees to protect the information contained herein from loss, disclosure, theft or compromise with at least the same care it employs to protect its own confidential information. Any dissemination or use of this information by a person other than the intended recipient is unauthorized and may be illegal. If you have received this e-mail in error, please notify us immediately by reply e-mail and destroy all copies.
_______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev