openssl098 0.9.8o-7ubuntu3.2.13.10.1 source package in Ubuntu

Changelog

openssl098 (0.9.8o-7ubuntu3.2.13.10.1) saucy-security; urgency=medium

  * SECURITY UPDATE: regression with certain renegotiations (LP: #1332643)
    - debian/patches/CVE-2014-0224-regression2.patch: accept CCS after
      sending finished ssl/s3_clnt.c.
  * Bring up to date with latest security patches from Ubuntu 10.04:
    (LP: #1331452)
  * SECURITY UPDATE: MITM via change cipher spec
    - debian/patches/CVE-2014-0224-1.patch: only accept change cipher spec
      when it is expected in ssl/s3_clnt.c, ssl/s3_pkt.c, ssl/s3_srvr.c,
      ssl/ssl3.h.
    - debian/patches/CVE-2014-0224-2.patch: don't accept zero length master
      secrets in ssl/s3_pkt.c.
    - debian/patches/CVE-2014-0224-3.patch: allow CCS after resumption in
      ssl/s3_clnt.c.
    - CVE-2014-0224
  * SECURITY UPDATE: denial of service via DTLS recursion flaw
    - debian/patches/CVE-2014-0221.patch: handle DTLS hello request without
      recursion in ssl/d1_both.c.
    - CVE-2014-0221
  * SECURITY UPDATE: arbitrary code execution via DTLS invalid fragment
    - debian/patches/CVE-2014-0195.patch: add consistency check for DTLS
      fragments in ssl/d1_both.c.
    - CVE-2014-0195
  * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
    - debian/patches/CVE-2013-0169.patch: massive code changes
    - CVE-2013-0169
  * SECURITY UPDATE: denial of service via invalid OCSP key
    - debian/patches/CVE-2013-0166.patch: properly handle NULL key in
      crypto/asn1/a_verify.c, crypto/ocsp/ocsp_vfy.c.
    - CVE-2013-0166
  * SECURITY UPDATE: denial of service attack in DTLS implementation
    - debian/patches/CVE_2012-2333.patch: guard for integer overflow
      before skipping explicit IV
    - CVE-2012-2333
  * SECURITY UPDATE: million message attack (MMA) in CMS and PKCS #7
    - debian/patches/CVE-2012-0884.patch: use a random key if RSA
      decryption fails to avoid leaking timing information
    - CVE-2012-0884
  * debian/patches/CVE-2012-0884-extra.patch: detect symmetric crypto
    - errors in PKCS7_decrypt and initialize tkeylen properly when
      encrypting CMS messages.
 -- Louis Bouchard <email address hidden>   Wed, 18 Jun 2014 12:22:48 +0200

Upload details

Uploaded by:
Louis Bouchard
Sponsored by:
Marc Deslauriers
Uploaded to:
Saucy
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
utils
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
openssl098_0.9.8o.orig.tar.gz 3.6 MiB befada1ac3819b1d317df8197b5e82ec768b39d250fcbef81e2b1cb7f165d448
openssl098_0.9.8o-7ubuntu3.2.13.10.1.debian.tar.gz 125.6 KiB 52f92303f0cf40206e274eee819a1b1e65475dff5af8fa3484f0dba889a5a7bb
openssl098_0.9.8o-7ubuntu3.2.13.10.1.dsc 2.2 KiB 39465ad9e51b9dd850a4c8b3d27f82d1f71a3e084397a63e8ddca5293d96bd14

View changes file

Binary packages built by this source

libcrypto0.9.8-udeb: No summary available for libcrypto0.9.8-udeb in ubuntu saucy.

No description available for libcrypto0.9.8-udeb in ubuntu saucy.

libssl0.9.8: No summary available for libssl0.9.8 in ubuntu saucy.

No description available for libssl0.9.8 in ubuntu saucy.

libssl0.9.8-dbg: No summary available for libssl0.9.8-dbg in ubuntu saucy.

No description available for libssl0.9.8-dbg in ubuntu saucy.