This bug was fixed in the package openssl - 0.9.8g-4ubuntu3.15
--------------- openssl (0.9.8g-4ubuntu3.15) hardy-security; urgency=low
* SECURITY UPDATE: ECDSA private key timing attack - crypto/ecdsa/ecs_ossl.c: compute with fixed scalar length - http://cvs.openssl.org/chngview?cn=20892 - CVE-2011-1945 * SECURITY UPDATE: ECDH ciphersuite denial of service - ssl/s3_lib.c, file ssl/s3_srvr.c: fix memory usage for thread safety - http://cvs.openssl.org/chngview?cn=21334 - CVE-2011-3210 * SECURITY UPDATE: DTLS plaintext recovery attack (LP: #922229) - ssl/d1_pkt.c: perform all computations before discarding messages - http://cvs.openssl.org/chngview?cn=21942 - http://cvs.openssl.org/chngview?cn=19574 - CVE-2011-4108 * SECURITY UPDATE: policy check double free vulnerability - crypto/x509v3/pcy_map.c, crypto/x509v3/pcy_tree.c: only free domain policy in one location - http://cvs.openssl.org/chngview?cn=21941 - CVE-2011-4019 * SECURITY UPDATE: incorrect elliptic curve computation TLS key exposure - crypto/bn/bn_nist.c: perform ellyiptic curve computations correctly - update to http://cvs.openssl.org/fileview?f=openssl/crypto/bn/bn_nist.c&v=1.20 - CVE-2011-4354 * SECURITY UPDATE: SSL 3.0 block padding exposure - ssl/s3_enc.c: clear bytes used for block padding of SSL 3.0 records. - http://cvs.openssl.org/chngview?cn=21940 - CVE-2011-4576 * SECURITY UPDATE: malformed RFC 3779 data denial of service attack - crypto/x509v3/v3_addr.c: prevent malformed RFC3779 data from triggering an assertion failure - http://cvs.openssl.org/chngview?cn=21937 - CVE-2011-4577 * SECURITY UPDATE: Server Gated Cryptography (SGC) denial of service - ssl/s3_srvr.c, ssl/ssl.h, ssl/ssl3.h, ssl/ssl_err.c: Only allow one SGC handshake restart for SSL/TLS. - CVE-2011-4619 * SECURITY UPDATE: fix for CVE-2011-4108 denial of service attack - ssl/d1_pkt.c: improve handling of DTLS MAC - http://cvs.openssl.org/chngview?cn=22032 - CVE-2012-0050 * crypto/ecdsa/ecdsatest.c: fix ECDSA tests - http://cvs.openssl.org/chngview?cn=21777 - http://cvs.openssl.org/chngview?cn=21995 * debian/libssl0.9.8.postinst: Only issue the reboot notification for servers by testing that the X server is not running (LP: #244250) -- Steve Beattie <email address hidden> Tue, 31 Jan 2012 01:46:26 -0800
This bug was fixed in the package openssl - 0.9.8g-4ubuntu3.15
--------------- 4ubuntu3. 15) hardy-security; urgency=low
openssl (0.9.8g-
* SECURITY UPDATE: ECDSA private key timing attack ecdsa/ecs_ ossl.c: compute with fixed scalar length cvs.openssl. org/chngview? cn=20892 cvs.openssl. org/chngview? cn=21334 cvs.openssl. org/chngview? cn=21942 cvs.openssl. org/chngview? cn=19574 x509v3/ pcy_map. c, crypto/ x509v3/ pcy_tree. c: only free cvs.openssl. org/chngview? cn=21941 bn/bn_nist. c: perform ellyiptic curve computations cvs.openssl. org/fileview? f=openssl/ crypto/ bn/bn_nist. c&v=1.20 cvs.openssl. org/chngview? cn=21940 x509v3/ v3_addr. c: prevent malformed RFC3779 data cvs.openssl. org/chngview? cn=21937 cvs.openssl. org/chngview? cn=22032 ecdsa/ecdsatest .c: fix ECDSA tests cvs.openssl. org/chngview? cn=21777 cvs.openssl. org/chngview? cn=21995 libssl0. 9.8.postinst: Only issue the reboot notification for
- crypto/
- http://
- CVE-2011-1945
* SECURITY UPDATE: ECDH ciphersuite denial of service
- ssl/s3_lib.c, file ssl/s3_srvr.c: fix memory usage for thread
safety
- http://
- CVE-2011-3210
* SECURITY UPDATE: DTLS plaintext recovery attack (LP: #922229)
- ssl/d1_pkt.c: perform all computations before discarding messages
- http://
- http://
- CVE-2011-4108
* SECURITY UPDATE: policy check double free vulnerability
- crypto/
domain policy in one location
- http://
- CVE-2011-4019
* SECURITY UPDATE: incorrect elliptic curve computation TLS key
exposure
- crypto/
correctly
- update to http://
- CVE-2011-4354
* SECURITY UPDATE: SSL 3.0 block padding exposure
- ssl/s3_enc.c: clear bytes used for block padding of SSL 3.0
records.
- http://
- CVE-2011-4576
* SECURITY UPDATE: malformed RFC 3779 data denial of service attack
- crypto/
from triggering an assertion failure
- http://
- CVE-2011-4577
* SECURITY UPDATE: Server Gated Cryptography (SGC) denial of service
- ssl/s3_srvr.c, ssl/ssl.h, ssl/ssl3.h, ssl/ssl_err.c: Only allow
one SGC handshake restart for SSL/TLS.
- CVE-2011-4619
* SECURITY UPDATE: fix for CVE-2011-4108 denial of service attack
- ssl/d1_pkt.c: improve handling of DTLS MAC
- http://
- CVE-2012-0050
* crypto/
- http://
- http://
* debian/
servers by testing that the X server is not running (LP: #244250)
-- Steve Beattie <email address hidden> Tue, 31 Jan 2012 01:46:26 -0800