[ubuntu/jaunty] openssl 0.9.8g-14ubuntu2 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Wed Jan 7 21:10:12 GMT 2009


openssl (0.9.8g-14ubuntu2) jaunty; urgency=low

  * SECURITY UPDATE: clients treat malformed signatures as good when verifying
    server DSA and ECDSA certificates
    - update apps/speed.c, apps/spkac.c, apps/verify.c, apps/x509.c,
      ssl/s2_clnt.c, ssl/s2_srvr.c, ssl/s3_clnt.c, s3_srvr.c, and
      ssl/ssltest.c to properly check the return code of EVP_VerifyFinal()
    - patch based on upstream patch for #2008-016
    - CVE-2008-5077

Date: Tue, 06 Jan 2009 00:44:19 -0600
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/openssl/0.9.8g-14ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 06 Jan 2009 00:44:19 -0600
Source: openssl
Binary: openssl openssl-doc libssl0.9.8 libcrypto0.9.8-udeb libssl-dev libssl0.9.8-dbg
Architecture: source
Version: 0.9.8g-14ubuntu2
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
 openssl-doc - Secure Socket Layer (SSL) documentation
Changes: 
 openssl (0.9.8g-14ubuntu2) jaunty; urgency=low
 .
   * SECURITY UPDATE: clients treat malformed signatures as good when verifying
     server DSA and ECDSA certificates
     - update apps/speed.c, apps/spkac.c, apps/verify.c, apps/x509.c,
       ssl/s2_clnt.c, ssl/s2_srvr.c, ssl/s3_clnt.c, s3_srvr.c, and
       ssl/ssltest.c to properly check the return code of EVP_VerifyFinal()
     - patch based on upstream patch for #2008-016
     - CVE-2008-5077
Checksums-Sha1: 
 7a49b3f8d59c1b0eb0cafb9b5c006e3f29061aae 1429 openssl_0.9.8g-14ubuntu2.dsc
 549e17e58c300086273c068af2569dac02111896 57576 openssl_0.9.8g-14ubuntu2.diff.gz
Checksums-Sha256: 
 42395f0545b075eb922fce8a35f580262a47da599828c977c347e5fca923234c 1429 openssl_0.9.8g-14ubuntu2.dsc
 0c9dd950d1030b0d286e65fcaa9a98175e03e0571f35459c148da4edb2aa7c6d 57576 openssl_0.9.8g-14ubuntu2.diff.gz
Files: 
 49574fdd1a0b382ebeb457849792194f 1429 utils optional openssl_0.9.8g-14ubuntu2.dsc
 eb72205fbb8365057d268183931beaeb 57576 utils optional openssl_0.9.8g-14ubuntu2.diff.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkljAIkACgkQW0JvuRdL8BqchQCdE8Z9t+76jbSK1ThchXcbEUaP
emIAnjMEN/P6Eu0gdZrXU1ZJI8lbqgPE
=QHGq
-----END PGP SIGNATURE-----


More information about the Jaunty-changes mailing list