Linux Security
Linux Security
Linux Security

Debian: DSA-2100-1: New openssl packages fix double free

Date 30 Aug 2010
Posted By LinuxSecurity Advisories
George Guninski discovered a double free in the ECDH code of the OpenSSL crypto library, which may lead to denial of service and potentially the execution of arbitrary code.
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2100-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
August 30, 2010             
- ------------------------------------------------------------------------

Package        : openssl
Vulnerability  : double free
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)      : CVE-2010-2939

George Guninski discovered a double free in the ECDH code of the OpenSSL
crypto library, which may lead to denial of service and potentially the
execution of arbitrary code.

For the stable distribution (lenny), this problem has been fixed in 
version 0.9.8g-15+lenny8.

For the unstable distribution (sid), this problem has been fixed in
version 0.9.8o-2.

We recommend that you upgrade your openssl packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:  3354792 acf70a16359bf3658bdfb74bda1c4419
    Size/MD5 checksum:     1973 b3bc5cc9d4396dd53408d1523e5d9922
    Size/MD5 checksum:    60148 e011a196c7a96bdcfba8e8d1c7842d7a

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  1028966 c533c4f1ed722bfc684fb2aa7ae0bbaf
    Size/MD5 checksum:  2583198 ee814656292202df8e66508a78e76757
    Size/MD5 checksum:   722118 7bfdc9cff603e3c71014987e99a33637
    Size/MD5 checksum:  2814048 c5309df7a3eff59618da50ea20e0bb1f
    Size/MD5 checksum:  4369476 8e583136a6e221ba239a305447cd55fd

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   975790 04b625095430068834e3621b47749d60
    Size/MD5 checksum:  2243092 0b4a82a5a95df9d092498065e2c69d88
    Size/MD5 checksum:  1627634 e86e98d321e13f6941a5b14568cecbae
    Size/MD5 checksum:   638416 d578d3861d7402f70d340cb138e969c8
    Size/MD5 checksum:  1043270 7ccee021eceb10b6bcd55222f0f9c00f

arm architecture (ARM)
    Size/MD5 checksum:  1028840 a473c6b7dfc800b0ad4f3a2320ed34e5
    Size/MD5 checksum:  1490650 9032ae14c182e5adbe934b083588a785
    Size/MD5 checksum:  2087038 b17611d1c503a30363357014a4523414
    Size/MD5 checksum:   536038 e44733e9826dc24561732f7885df50f3
    Size/MD5 checksum:   844412 1a23967e4c4c3ad3f97c21a47e8d3bac

armel architecture (ARM EABI)
    Size/MD5 checksum:  1031134 cfce1ef9bc3a6768ed052b23d9781cdf
    Size/MD5 checksum:   849994 340a78374851cbd1aca2ea8344ba54ba
    Size/MD5 checksum:  2096496 34ad0dffc16f3ff0deac8fb6e8b2cd2e
    Size/MD5 checksum:   540784 51b9cd8fee37fbd55c512db13e556b2c
    Size/MD5 checksum:  1506252 7d52d569cd8be4e1ce2f60cf05519ed8

hppa architecture (HP PA RISC)
    Size/MD5 checksum:  2268554 4339767f35a5fdfe0e20c11eea6f3b82
    Size/MD5 checksum:  1046972 66ba3aa9fb82893461f7dfd38c2fb586
    Size/MD5 checksum:   969042 5851386ee3b68d609533896a64701aea
    Size/MD5 checksum:  1528486 f867ab97ab589b0356b7e5085c337442
    Size/MD5 checksum:   634500 02ad6d507ccc026810116b0e2a9d1b0c

i386 architecture (Intel ia32)
    Size/MD5 checksum:  1035808 891f554f175236fed6ba2e78836efbf0
    Size/MD5 checksum:  2977216 e7002003f49898963b51fc60d986660b
    Size/MD5 checksum:  5393090 596c50c449a97cd8652e7116df06cb82
    Size/MD5 checksum:   591774 4eadb7676b04e66b2ce5a94c0fbabeaf
    Size/MD5 checksum:  2108390 88d1201dbb7f7e2806f36c9c8b945c60

ia64 architecture (Intel ia64)
    Size/MD5 checksum:  2666450 490fc734a403d18fdcff30f3d4430eb7
    Size/MD5 checksum:  1465484 d44c2feba9e5e946a1f05975c010eff5
    Size/MD5 checksum:   865354 db7a81175a7687d21a7bc78651758fdc
    Size/MD5 checksum:  1105058 d757a92ae7a9992aed13984efce04c27
    Size/MD5 checksum:  1280580 9302c8ec90b228b8e5c309077345a4f6

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:   899398 f1afc1bd010c170d4c3cc1536dc18f99
    Size/MD5 checksum:  2304822 7119c17aad6cedb6fe917b006cbd23aa
    Size/MD5 checksum:   585112 315040d22ee0183a8743d4f83d475e55
    Size/MD5 checksum:  1624120 028858a3ea8b187e62cfbef6472d0a3d
    Size/MD5 checksum:  1024826 e05816850ac1042054512581efad8186

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:  1588188 2d22ed0b4f0ba51a99124d02fc4f938f
    Size/MD5 checksum:   572372 ae996b71ca701f620f47f3f9b3adb4e5
    Size/MD5 checksum:  2294950 4ead973a8ae6b219789383a098129f6e
    Size/MD5 checksum:   885576 d71d3da4eabce725eb9db564ed51f94f
    Size/MD5 checksum:  1012124 9852687e5a2129c070e19c174c04a57f

powerpc architecture (PowerPC)
    Size/MD5 checksum:  1000536 302fdfa358fa81643764272c3bfb6bd6
    Size/MD5 checksum:  2244344 442368fa4ab11ea17fa752f66bbce767
    Size/MD5 checksum:  1644026 fb2bb5e6d08598405cf0cbbf47aa2a08
    Size/MD5 checksum:  1035350 41f30f1ea50b63ba43c7bdfabef0e5ca
    Size/MD5 checksum:   656162 a8d196b8c6ddec04bba99cf105a82f89

s390 architecture (IBM S/390)
    Size/MD5 checksum:  1602434 556df4caf296dcabe80911f991165f9d
    Size/MD5 checksum:  1024524 ec70f8625e30bbdfa7da0eba25d2d1c6
    Size/MD5 checksum:  2231778 293db646ff3508532b143725d18e3edb
    Size/MD5 checksum:   693038 578371a2bdde98c7f1fcef9371eeaca5
    Size/MD5 checksum:  1051104 d0242ea2b04ad52eb795bd7a6569298d

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  3867898 081e1addfcfcea3c32fddef4570806a6
    Size/MD5 checksum:  1044670 bfc18d2fd2a61d2c093f0a1e2395df5c
    Size/MD5 checksum:  2148206 88e85ad27c456f5b68553e58de8a2d2b
    Size/MD5 checksum:  2292216 b98676306a58912992cef47a76615171
    Size/MD5 checksum:   580504 6a12e4b8e9ea08da70d48c65e59b6828

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"52","type":"x","order":"1","pct":80,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"8","type":"x","order":"2","pct":12.31,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":7.69,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.