lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1M7ArF-0000t4-9Q@titan.mandriva.com>
Date: Thu, 21 May 2009 18:11:01 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:120 ] openssl


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:120
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : openssl
 Date    : May 21, 2009
 Affected: 2008.1, 2009.0, 2009.1
 _______________________________________________________________________

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in OpenSSL:
 
 The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k
 and earlier 0.9.8 versions allows remote attackers to cause a denial
 of service (memory consumption) via a large series of future epoch
 DTLS records that are buffered in a queue, aka DTLS record buffer
 limitation bug. (CVE-2009-1377)
 
 Multiple memory leaks in the dtls1_process_out_of_seq_message function
 in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow
 remote attackers to cause a denial of service (memory consumption)
 via DTLS records that (1) are duplicates or (2) have sequence numbers
 much greater than current sequence numbers, aka DTLS fragment handling
 memory leak. (CVE-2009-1378)
 
 The updated packages have been patched to prevent this.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 9492fe3bf022be9f7529e594844033d4  2008.1/i586/libopenssl0.9.8-0.9.8g-4.4mdv2008.1.i586.rpm
 54166454819e21289e49a6e2986e7f30  2008.1/i586/libopenssl0.9.8-devel-0.9.8g-4.4mdv2008.1.i586.rpm
 0ee9a01df9bc622268eb052400433de7  2008.1/i586/libopenssl0.9.8-static-devel-0.9.8g-4.4mdv2008.1.i586.rpm
 b681fd12d6cd2bdbb85d1726b2db4a99  2008.1/i586/openssl-0.9.8g-4.4mdv2008.1.i586.rpm 
 217fe6c6af5265755ec2105b1f3bebaf  2008.1/SRPMS/openssl-0.9.8g-4.4mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 6409f96a04a2d3946a1b72f63a868e5d  2008.1/x86_64/lib64openssl0.9.8-0.9.8g-4.4mdv2008.1.x86_64.rpm
 d00a048d4d263f28539171f89d5de1e8  2008.1/x86_64/lib64openssl0.9.8-devel-0.9.8g-4.4mdv2008.1.x86_64.rpm
 03bbd2a59f8bc5f0d1d6cb54736f024c  2008.1/x86_64/lib64openssl0.9.8-static-devel-0.9.8g-4.4mdv2008.1.x86_64.rpm
 797c40fa3bd86009061423713e2292c5  2008.1/x86_64/openssl-0.9.8g-4.4mdv2008.1.x86_64.rpm 
 217fe6c6af5265755ec2105b1f3bebaf  2008.1/SRPMS/openssl-0.9.8g-4.4mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 94d6f4be3c42586813be16a2270c89bf  2009.0/i586/libopenssl0.9.8-0.9.8h-3.3mdv2009.0.i586.rpm
 59e4214a9e5d703a88e5c695adf498b9  2009.0/i586/libopenssl0.9.8-devel-0.9.8h-3.3mdv2009.0.i586.rpm
 3819b2efba54362f7e8e4a821254f258  2009.0/i586/libopenssl0.9.8-static-devel-0.9.8h-3.3mdv2009.0.i586.rpm
 ecd5bea8f1fe9dd6b4e8506c0b0705ae  2009.0/i586/openssl-0.9.8h-3.3mdv2009.0.i586.rpm 
 c4354a0c28d3e83b9ff529a70bede4bd  2009.0/SRPMS/openssl-0.9.8h-3.3mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 e3c14742691a67f21ed7a7c9abe775a2  2009.0/x86_64/lib64openssl0.9.8-0.9.8h-3.3mdv2009.0.x86_64.rpm
 b2bc687de0793a6c14649fa68c7d043b  2009.0/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.3mdv2009.0.x86_64.rpm
 76f91d3544039f65b77894a86a45e09c  2009.0/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.3mdv2009.0.x86_64.rpm
 418ef4a5a9a24fc8437baf75d8c12944  2009.0/x86_64/openssl-0.9.8h-3.3mdv2009.0.x86_64.rpm 
 c4354a0c28d3e83b9ff529a70bede4bd  2009.0/SRPMS/openssl-0.9.8h-3.3mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 9c46d7da9fb61cef36532ea0c25fd881  2009.1/i586/libopenssl0.9.8-0.9.8k-1.1mdv2009.1.i586.rpm
 7a984a72c9b2c7b0549dabf4f7b353fd  2009.1/i586/libopenssl0.9.8-devel-0.9.8k-1.1mdv2009.1.i586.rpm
 0e8b58b6e02958d05d19e78d9725cd45  2009.1/i586/libopenssl0.9.8-static-devel-0.9.8k-1.1mdv2009.1.i586.rpm
 a32d8acd870490b6efba309da6dce043  2009.1/i586/openssl-0.9.8k-1.1mdv2009.1.i586.rpm 
 7b9c16777f3e88674fb65d0c28df10ff  2009.1/SRPMS/openssl-0.9.8k-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 8f3c93a2af5e8950bbc3846fc7f90568  2009.1/x86_64/lib64openssl0.9.8-0.9.8k-1.1mdv2009.1.x86_64.rpm
 8573eab7fdffff97807255dc91154abc  2009.1/x86_64/lib64openssl0.9.8-devel-0.9.8k-1.1mdv2009.1.x86_64.rpm
 a557449ae9983495e61eabaeb5300895  2009.1/x86_64/lib64openssl0.9.8-static-devel-0.9.8k-1.1mdv2009.1.x86_64.rpm
 99f346d65571efb2c4142aab5f074038  2009.1/x86_64/openssl-0.9.8k-1.1mdv2009.1.x86_64.rpm 
 7b9c16777f3e88674fb65d0c28df10ff  2009.1/SRPMS/openssl-0.9.8k-1.1mdv2009.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKFVC5mqjQ0CJFipgRAtM8AJ4rG/qVR2mmrgw4dKgmbxz/d18zMQCfa/qL
p/lIHdhpygpSxPt6iwyKWI4=
=tZ5R
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ