Debian: DSA-3287-1: openssl security update

    Date13 Jun 2015
    CategoryDebian
    48
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets Layer toolkit. CVE-2014-8176
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3287-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Alessandro Ghedini
    June 13, 2015                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openssl
    CVE ID         : CVE-2014-8176 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790
                     CVE-2015-1791 CVE-2015-1792 CVE-2015-4000
    
    Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
    Layer toolkit.
    
    CVE-2014-8176
    
        Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered
        that an invalid memory free could be triggered when buffering DTLS
        data. This could allow remote attackers to cause a denial of service
        (crash) or potentially execute arbitrary code. This issue only
        affected the oldstable distribution (wheezy).
    
    CVE-2015-1788
    
        Joseph Barr-Pixton discovered that an infinite loop could be triggered
        due to incorrect handling of malformed ECParameters structures. This
        could allow remote attackers to cause a denial of service.
    
    CVE-2015-1789
    
        Robert Swiecki and Hanno Böck discovered that the X509_cmp_time
        function could read a few bytes out of bounds. This could allow remote
        attackers to cause a denial of service (crash) via crafted
        certificates and CRLs.
    
    CVE-2015-1790
    
        Michal Zalewski discovered that the PKCS#7 parsing code did not
        properly handle missing content which could lead to a NULL pointer
        dereference. This could allow remote attackers to cause a denial of
        service (crash) via crafted ASN.1-encoded PKCS#7 blobs.
    
    CVE-2015-1791
    
        Emilia Käsper discovered that a race condition could occur due to
        incorrect handling of NewSessionTicket in a multi-threaded client,
        leading to a double free. This could allow remote attackers to cause
        a denial of service (crash).
    
    CVE-2015-1792
    
        Johannes Bauer discovered that the CMS code could enter an infinite
        loop when verifying a signedData message, if presented with an
        unknown hash function OID. This could allow remote attackers to cause
        a denial of service.
    
    Additionally OpenSSL will now reject handshakes using DH parameters
    shorter than 768 bits as a countermeasure against the Logjam attack
    (CVE-2015-4000).
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 1.0.1e-2+deb7u17.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 1.0.1k-3+deb8u1.
    
    For the testing distribution (stretch), these problems have been fixed
    in version 1.0.2b-1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 1.0.2b-1.
    
    We recommend that you upgrade your openssl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":61.54,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":23.08,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":15.38,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.