BugTraq
[SECURITY] [DSA 3413-1] openssl security update Dec 04 2015 07:43AM
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3413-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
December 04, 2015 https://www.debian.org/security/faq
- ------------------------------------------------------------------------
-

Package : openssl
CVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196

Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2015-3194

Loic Jonas Etienne of Qnective AG discovered that the signature
verification routines will crash with a NULL pointer dereference if
presented with an ASN.1 signature using the RSA PSS algorithm and
absent mask generation function parameter. A remote attacker can
exploit this flaw to crash any certificate verification operation
and mount a denial of service attack.

CVE-2015-3195

Adam Langley of Google/BoringSSL discovered that OpenSSL will leak
memory when presented with a malformed X509_ATTRIBUTE structure.

CVE-2015-3196

A race condition flaw in the handling of PSK identify hints was
discovered, potentially leading to a double free of the identify
hint data.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0.1e-2+deb7u18.

For the stable distribution (jessie), these problems have been fixed in
version 1.0.1k-3+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.2e-1 or earlier.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Obcn
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus