Debian Security Advisory DSA-3197-2 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
March 24, 2015 http://www.debian.org/security/faq
Package : openssl
CVE ID : CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288
CVE-2015-0289 CVE-2015-0292
Debian Bug : 781081
The openssl update issued as DSA 3197-1 caused regressions. This update
reverts the defective patch applied in that update causing these
problems. Additionally a follow-up fix for CVE-2015-0209 is applied.
For reference the original advisory text follows.
Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:
CVE-2015-0286
Stephen Henson discovered that the ASN1_TYPE_cmp() function
can be crashed, resulting in denial of service.
CVE-2015-0287
Emilia Kaesper discovered a memory corruption in ASN.1 parsing.
CVE-2015-0289
Michal Zalewski discovered a NULL pointer dereference in the
PKCS#7 parsing code, resulting in denial of service.
CVE-2015-0292
It was discovered that missing input sanitising in base64 decoding
might result in memory corruption.
CVE-2015-0209
It was discovered that a malformed EC private key might result in
memory corruption.
CVE-2015-0288
It was discovered that missing input sanitising in the
X509_to_X509_REQ() function might result in denial of service.
For the stable distribution (wheezy), these problems have been fixed in
version 1.0.1e-2+deb7u16.
We recommend that you upgrade your openssl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | mips | openssl | < 1.0.1e-2+deb7u16 | openssl_1.0.1e-2+deb7u16_mips.deb |
Debian | 7 | armel | libssl1.0.0-dbg | < 1.0.1e-2+deb7u15 | libssl1.0.0-dbg_1.0.1e-2+deb7u15_armel.deb |
Debian | 7 | kfreebsd-i386 | libcrypto1.0.0-udeb | < 1.0.1e-2+deb7u15 | libcrypto1.0.0-udeb_1.0.1e-2+deb7u15_kfreebsd-i386.deb |
Debian | 7 | ia64 | libcrypto1.0.0-udeb | < 1.0.1e-2+deb7u16 | libcrypto1.0.0-udeb_1.0.1e-2+deb7u16_ia64.deb |
Debian | 7 | s390 | libssl1.0.0 | < 1.0.1e-2+deb7u16 | libssl1.0.0_1.0.1e-2+deb7u16_s390.deb |
Debian | 7 | mipsel | openssl | < 1.0.1e-2+deb7u15 | openssl_1.0.1e-2+deb7u15_mipsel.deb |
Debian | 7 | armhf | libssl1.0.0-dbg | < 1.0.1e-2+deb7u15 | libssl1.0.0-dbg_1.0.1e-2+deb7u15_armhf.deb |
Debian | 7 | s390x | libssl1.0.0 | < 1.0.1e-2+deb7u15 | libssl1.0.0_1.0.1e-2+deb7u15_s390x.deb |
Debian | 7 | mipsel | libcrypto1.0.0-udeb | < 1.0.1e-2+deb7u15 | libcrypto1.0.0-udeb_1.0.1e-2+deb7u15_mipsel.deb |
Debian | 7 | kfreebsd-amd64 | openssl | < 1.0.1e-2+deb7u15 | openssl_1.0.1e-2+deb7u15_kfreebsd-amd64.deb |