Debian Security Advisory
DLA-177-1 openssl -- LTS security update
- Date Reported:
- 20 Mar 2015
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293.
- More information:
Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues:
It was discovered that a malformed EC private key might result in memory corruption.
Stephen Henson discovered that the ASN1_TYPE_cmp() function can be crashed, resulting in denial of service.
Emilia Kaesper discovered a memory corruption in ASN.1 parsing.
It was discovered that missing input sanitising in the X509_to_X509_REQ() function might result in denial of service.
Michal Zalewski discovered a NULL pointer dereference in the PKCS#7 parsing code, resulting in denial of service.
It was discovered that missing input sanitising in base64 decoding might result in memory corruption.
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message.
For Debian 6
Squeeze, these issues have been fixed in openssl version 0.9.8o-4squeeze20