lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040317201405.GA11116@alcor.net> From: debian-security-announce at lists.debian.org (debian-security-announce@...ts.debian.org) Subject: [SECURITY] [DSA 465-1] New openssl packages fix multiple vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 465-1 security@...ian.org http://www.debian.org/security/ Matt Zimmerman March 17th, 2004 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : openssl,openssl094,openssl095 Vulnerability : several Problem-Type : remote Debian-specific: no CVE Ids : CAN-2004-0079 CAN-2004-0081 Two vulnerabilities were discovered in openssl, an implementation of the SSL protocol, using the Codenomicon TLS Test Tool. More information can be found in the following NISCC Vulnerability Advisory: http://www.uniras.gov.uk/vuls/2004/224012/index.htm and this OpenSSL advisory: http://www.openssl.org/news/secadv_20040317.txt - CAN-2004-0079 - null-pointer assignment in the do_change_cipher_spec() function. A remote attacker could perform a carefully crafted SSL/TLS handshake against a server that used the OpenSSL library in such a way as to cause OpenSSL to crash. Depending on the application this could lead to a denial of service. - CAN-2004-0081 - a bug in older versions of OpenSSL 0.9.6 that can lead to a Denial of Service attack (infinite loop). For the stable distribution (woody) these problems have been fixed in openssl version 0.9.6c-2.woody.6, openssl094 version 0.9.4-6.woody.4 and openssl095 version 0.9.5a-6.woody.5. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you update your openssl package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6.dsc Size/MD5 checksum: 632 c12536a01aca47e52d17e22310acbdd7 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6.diff.gz Size/MD5 checksum: 44829 7478b91c110b6f1e52cf459cb44c07e1 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c.orig.tar.gz Size/MD5 checksum: 2153980 c8261d93317635d56df55650c6aeb3dc http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4-6.woody.3.dsc Size/MD5 checksum: 624 e10b520a03dc6a86acd3609ed390bf21 http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4-6.woody.3.diff.gz Size/MD5 checksum: 46851 5108530e438a6c00458fb034db238392 http://security.debian.org/pool/updates/main/o/openssl094/openssl094_0.9.4.orig.tar.gz Size/MD5 checksum: 1570392 72544daea16d6c99d656b95f77b01b2d http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.5.dsc Size/MD5 checksum: 631 0548af08e7b80fe2c7e73108bf352230 http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.5.diff.gz Size/MD5 checksum: 39190 837e26caaf8c22a566dbefdd6ffc56ea http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a.orig.tar.gz Size/MD5 checksum: 1892089 99d22f1d4d23ff8b927f94a9df3997b4 Architecture independent components: http://security.debian.org/pool/updates/main/o/openssl/ssleay_0.9.6c-2.woody.6_all.deb Size/MD5 checksum: 980 be0ff309c754f9eb062bdc7d65a71819 Alpha architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_alpha.deb Size/MD5 checksum: 1551564 72e47db6c9dcda4e5a6acf92a1ea2101 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_alpha.deb Size/MD5 checksum: 571350 cfd18f4a40a6cffbbaef2f14f4e94aa1 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_alpha.deb Size/MD5 checksum: 736410 f16961ca1e20d6f88f9bf99aa94b817b http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_alpha.deb Size/MD5 checksum: 497332 066bc60aaa29ae1fb0d24c7c46a7e0cd ARM architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_arm.deb Size/MD5 checksum: 1358118 42ee5f1969cae9faee362fad210422da http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_arm.deb Size/MD5 checksum: 474164 8ca5f15c012b6eb5bad33bf27180b9e1 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_arm.deb Size/MD5 checksum: 729876 259449511f610538b0429ad552d627e9 http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_arm.deb Size/MD5 checksum: 402664 6c3c6fb33553e370d966161c44371eed Intel IA-32 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_i386.deb Size/MD5 checksum: 1290986 ee3f1bd5dc3de3e7dff6e945e73bf7b1 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_i386.deb Size/MD5 checksum: 461870 8d24ba643ce45cf495d775fa7062e53e http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_i386.deb Size/MD5 checksum: 723346 e258d6e5c4e79767d1b75ae29a103a6d http://security.debian.org/pool/updates/main/o/openssl094/libssl09_0.9.4-6.woody.3_i386.deb Size/MD5 checksum: 358500 92eb1693ec21ca108f0d06932ce4f9db http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_i386.deb Size/MD5 checksum: 399952 068f0a3443cbebbd23571df0170cad84 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_ia64.deb Size/MD5 checksum: 1615338 e59a7278d4d972943247b83d57e1712b http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_ia64.deb Size/MD5 checksum: 711170 bb0b97f071f942d23d2f7f5362c34c06 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_ia64.deb Size/MD5 checksum: 763566 e3ebf464f440dbd86ae18c1b25ebac0f HP Precision architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_hppa.deb Size/MD5 checksum: 1435466 2c77d74ee8c1aaf6bebf02538f307ef6 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_hppa.deb Size/MD5 checksum: 565020 9133258c424eadf23b659993439e4147 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_hppa.deb Size/MD5 checksum: 742002 a5222dc5116da8dce774643cb09925bb Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_m68k.deb Size/MD5 checksum: 1266746 94ce507777c7889cac278a1701bfa07d http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_m68k.deb Size/MD5 checksum: 450742 cdb074142fb09b42b44d581bfe39f3b6 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_m68k.deb Size/MD5 checksum: 720494 1c563a7eb888efbe767caf60d58d60c3 http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_m68k.deb Size/MD5 checksum: 376910 1976f00b903cbf56c3fecd8746bcdb13 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_mips.deb Size/MD5 checksum: 1416298 3784e3df38ca0e7429ebc3bd3443a751 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_mips.deb Size/MD5 checksum: 483772 781e99d232b8cb2d8eb2ffd7872be3cd http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_mips.deb Size/MD5 checksum: 717852 f40b33d0bf0259121d73eb24d765c95d http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_mips.deb Size/MD5 checksum: 412764 6b1c44e692941adab697af4f9bc548d9 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.5_mipsel.deb Size/MD5 checksum: 1410210 51022eaeba69faf250c2bec4384c399b http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.5_mipsel.deb Size/MD5 checksum: 476744 76be9bc27f5fe75f05ecf0a1b3a54f3c http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.5_mipsel.deb Size/MD5 checksum: 717148 047c9f61de01b84f73dc18a5b2e7c507 http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_mipsel.deb Size/MD5 checksum: 407554 98928a0620c1fef51662c4f03ef56de6 PowerPC architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_powerpc.deb Size/MD5 checksum: 1386978 6e7b16a9bb3e2e780ef76408f516e760 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_powerpc.deb Size/MD5 checksum: 502578 ad9b8b2222b035154fae759f1a1f6a29 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_powerpc.deb Size/MD5 checksum: 726792 7a1881432528a890c0ca9800fc33b6c2 http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_powerpc.deb Size/MD5 checksum: 425652 43e11b5bc3ed981c2c68418cbafa37e2 IBM S/390 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_s390.deb Size/MD5 checksum: 1326484 663c1bd6518a284d2fde11ff5d728506 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_s390.deb Size/MD5 checksum: 510582 61670cd45b446474caaae9fd7bac74b0 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_s390.deb Size/MD5 checksum: 731686 6e5f1c96f5c0d1c78ed74b6f90d15e2d Sun Sparc architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.6_sparc.deb Size/MD5 checksum: 1344384 f383f9926645f06e8458c4f4cdf9c4b5 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.6_sparc.deb Size/MD5 checksum: 484864 76b6f3d6b33969295aa38b4285b4bc16 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.6_sparc.deb Size/MD5 checksum: 737280 9f57ba959daa989b54b214ebbb8824a4 http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.5_sparc.deb Size/MD5 checksum: 412390 a596f5a5a4df199a088c86e96e3eae9b These files will probably be moved into the stable distribution on its next revision. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAWLFXArxCt0PiXR4RAvvZAKDc7DJ9ghXaT8lM1uwbSABNNl0TPACfY+Hw lMQzt6Y+GuuhNL2VFg1xw4o= =LKoz -----END PGP SIGNATURE-----
Powered by blists - more mailing lists