it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update
- Date: Fri, 04 Dec 2015 07:43:46 +0000
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <carnil AT master.debian.org>
- Priority: urgent
- Resent-date: Fri, 4 Dec 2015 07:44:03 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <pYUWK7OJY7L.A.qU.DRUYWB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3413-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 04, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openssl
CVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196
Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:
CVE-2015-3194
Loic Jonas Etienne of Qnective AG discovered that the signature
verification routines will crash with a NULL pointer dereference if
presented with an ASN.1 signature using the RSA PSS algorithm and
absent mask generation function parameter. A remote attacker can
exploit this flaw to crash any certificate verification operation
and mount a denial of service attack.
CVE-2015-3195
Adam Langley of Google/BoringSSL discovered that OpenSSL will leak
memory when presented with a malformed X509_ATTRIBUTE structure.
CVE-2015-3196
A race condition flaw in the handling of PSK identify hints was
discovered, potentially leading to a double free of the identify
hint data.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0.1e-2+deb7u18.
For the stable distribution (jessie), these problems have been fixed in
version 1.0.1k-3+deb8u2.
For the unstable distribution (sid), these problems have been fixed in
version 1.0.2e-1 or earlier.
We recommend that you upgrade your openssl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=Obcn
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3413-1] openssl security update, Salvatore Bonaccorso, 04.12.2015
Archiv bereitgestellt durch MHonArc 2.6.19.