Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update
  • Date: Fri, 04 Dec 2015 07:43:46 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Fri, 4 Dec 2015 07:44:03 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <pYUWK7OJY7L.A.qU.DRUYWB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3413-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 04, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssl
CVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196

Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2015-3194

Loic Jonas Etienne of Qnective AG discovered that the signature
verification routines will crash with a NULL pointer dereference if
presented with an ASN.1 signature using the RSA PSS algorithm and
absent mask generation function parameter. A remote attacker can
exploit this flaw to crash any certificate verification operation
and mount a denial of service attack.

CVE-2015-3195

Adam Langley of Google/BoringSSL discovered that OpenSSL will leak
memory when presented with a malformed X509_ATTRIBUTE structure.

CVE-2015-3196

A race condition flaw in the handling of PSK identify hints was
discovered, potentially leading to a double free of the identify
hint data.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0.1e-2+deb7u18.

For the stable distribution (jessie), these problems have been fixed in
version 1.0.1k-3+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.2e-1 or earlier.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWYUP3AAoJEAVMuPMTQ89E08kP/Rsh8j93hYf/ut2epcYJVd0h
IvRswdSoIoTjpXrdYsXqh1sUg2pz7TBP4h+wDIZRD8WeWnsE2XLif58XuFt4Mkdx
NnT2NNMfG91+gSwJU9p0/jg013zkfwuc4LowAigkvhoKm59u/J/B6aWezJdqXJH0
h8w0bJrk6KQ5QJ/4MbWxKK5cUM7cwD6NNWGNx9o7Frn68LCDcFQ7hcxTYTBkbpf6
fbRbhXUNK5w/+urI/Ui7wkQ1mznpbRPZcl73R9FTyFs35xDwRSiVd1RyBOxm58Qv
cwXjZO4fzFubHLs2xwEPrri7lY2/pZsWA3+fZ0DDfa6tEP+M0sC89u10pMGw2ZsC
SoLoD6i1qdlP2sQDIERoZYYXHTF5VEFF7UfuMHEeDmoKM3m7YI4XrkAyo379f23l
AvCde8Rl26vFWg0TCmV7Np+TbLc2/8kNw4T2M1l+SNtix3QNAsDPTAu1ZuoRCu7l
F8JTuxs/g4lpbXffu91GZo3ldah0T+TaGl4mWiA+RQWjDJOP95vOWcDcOBs1ubQi
3fmt5i/bmB44PT7uJYgz8H+K8zsF8w1QrzoDlQ2YORdJJkd9u5fPinoNlOUaEkP4
ou9fhXCKZcI4aNOgIxx1OAnHn+fP12ubFmmkpPeO4/QM6Uf8FyCifH7oSyf/h/Nn
5nBfbEG+EXtTlLMXYoch
=Obcn
-----END PGP SIGNATURE-----




  • [IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update, Salvatore Bonaccorso, 04.12.2015

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang