Debian GNU/Linux Information for VU#386964

OpenSSL SSLv2 client code fails to properly check for NULL



Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References



Debian has published Debian Security Advisory DSA 1185 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.

If you have feedback, comments, or additional information about this vulnerability, please send us email.