Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3197-1: openssl security update

    Date 19 Mar 2015
    229
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3197-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                        Moritz Muehlenhoff
    March 19, 2015                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openssl
    CVE ID         : CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 
                     CVE-2015-0289 CVE-2015-0292
    
    Multiple vulnerabilities have been discovered in OpenSSL, a Secure
    Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
    identifies the following issues:
    
    CVE-2015-0286
    
        Stephen Henson discovered that the ASN1_TYPE_cmp() function
        can be crashed, resulting in denial of service.
    
    CVE-2015-0287
    
        Emilia Kaesper discovered a memory corruption in ASN.1 parsing.
    
    CVE-2015-0289
    
        Michal Zalewski discovered a NULL pointer dereference in the
        PKCS#7 parsing code, resulting in denial of service.
    
    CVE-2015-0292
    
        It was discovered that missing input sanitising in base64 decoding
        might result in memory corruption.
    
    CVE-2015-0209
    
        It was discovered that a malformed EC private key might result in
        memory corruption.
    
    CVE-2015-0288
    
        It was discovered that missing input sanitising in the
        X509_to_X509_REQ() function might result in denial of service.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 1.0.1e-2+deb7u15. In this update the export ciphers are removed
    from the default cipher list.
    
    We recommend that you upgrade your openssl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    How long have you been using Linux?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/46-how-long-have-you-been-using-linux?task=poll.vote&format=json
    46
    radio
    [{"id":"160","title":"Just made the switch!","votes":"3","type":"x","order":"1","pct":10.71,"resources":[]},{"id":"161","title":"1-5 years","votes":"5","type":"x","order":"2","pct":17.86,"resources":[]},{"id":"162","title":"6-10 years","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"163","title":">10 years - I'm a veteran!","votes":"20","type":"x","order":"4","pct":71.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.