Ubuntu 1424-1: OpenSSL vulnerabilities

    Date19 Apr 2012
    Posted ByLinuxSecurity Advisories
    An application using OpenSSL could be made to crash or run programs if it opened a specially crafted file.
    Ubuntu Security Notice USN-1424-1
    April 19, 2012
    openssl vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 11.10
    - Ubuntu 11.04
    - Ubuntu 10.04 LTS
    - Ubuntu 8.04 LTS
    An application using OpenSSL could be made to crash or run programs if it
    opened a specially crafted file.
    Software Description:
    - openssl: Secure Socket Layer (SSL) cryptographic library and tools
    It was discovered that OpenSSL could be made to dereference a NULL pointer
    when processing S/MIME messages. A remote attacker could use this to cause
    a denial of service. These issues did not affect Ubuntu 8.04 LTS.
    (CVE-2006-7250, CVE-2012-1165)
    Tavis Ormandy discovered that OpenSSL did not properly perform bounds
    checking when processing DER data via BIO or FILE functions. A remote
    attacker could trigger this flaw in services that used SSL to cause a
    denial of service or possibly execute arbitrary code with application
    privileges. (CVE-2012-2110)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 11.10:
      libssl1.0.0                     1.0.0e-2ubuntu4.4
    Ubuntu 11.04:
      libssl0.9.8                     0.9.8o-5ubuntu1.4
    Ubuntu 10.04 LTS:
      libssl0.9.8                     0.9.8k-7ubuntu8.10
    Ubuntu 8.04 LTS:
      libssl0.9.8                     0.9.8g-4ubuntu3.17
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
      CVE-2006-7250, CVE-2012-1165, CVE-2012-2110
    Package Information:
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.