[ubuntu/utopic-proposed] openssl 1.0.1f-1ubuntu7 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Thu Aug 7 15:36:17 UTC 2014


openssl (1.0.1f-1ubuntu7) utopic; urgency=medium

  * SECURITY UPDATE: double free when processing DTLS packets
    - debian/patches/CVE-2014-3505.patch: fix double free in ssl/d1_both.c.
    - CVE-2014-3505
  * SECURITY UPDATE: DTLS memory exhaustion
    - debian/patches/CVE-2014-3506.patch: fix DTLS handshake message size
      checks in ssl/d1_both.c.
    - CVE-2014-3506
  * SECURITY UPDATE: DTLS memory leak from zero-length fragments
    - debian/patches/CVE-2014-3507.patch: fix memory leak and return codes
      in ssl/d1_both.c.
    - CVE-2014-3507
  * SECURITY UPDATE: information leak in pretty printing functions
    - debian/patches/CVE-2014-3508.patch: fix OID handling in
      crypto/asn1/a_object.c, crypto/objects/obj_dat.c.
    - CVE-2014-3508
  * SECURITY UPDATE: race condition in ssl_parse_serverhello_tlsext
    - debian/patches/CVE-2014-3509.patch: fix race in ssl/t1_lib.c.
    - CVE-2014-3509
  * SECURITY UPDATE: DTLS anonymous EC(DH) denial of service
    - debian/patches/CVE-2014-3510.patch: check for server certs in
      ssl/d1_clnt.c, ssl/s3_clnt.c.
    - CVE-2014-3510
  * SECURITY UPDATE: TLS protocol downgrade attack
    - debian/patches/CVE-2014-3511.patch: properly handle fragments in
      ssl/s23_srvr.c.
    - CVE-2014-3511
  * SECURITY UPDATE: SRP buffer overrun
    - debian/patches/CVE-2014-3512.patch: check parameters in
      crypto/srp/srp_lib.c.
    - CVE-2014-3512
  * SECURITY UPDATE: crash with SRP ciphersuite in Server Hello message
    - debian/patches/CVE-2014-5139.patch: fix SRP authentication and make
      sure ciphersuite is set up correctly in ssl/s3_clnt.c, ssl/ssl_lib.c,
      ssl/s3_lib.c, ssl/ssl.h, ssl/ssl_ciph.c, ssl/ssl_locl.h.
    - CVE-2014-5139

Date: Thu, 07 Aug 2014 09:34:54 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/utopic/+source/openssl/1.0.1f-1ubuntu7
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 07 Aug 2014 09:34:54 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.1f-1ubuntu7
Distribution: utopic
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
 libssl-dev - Secure Sockets Layer toolkit - development files
 libssl-doc - Secure Sockets Layer toolkit - development documentation
 libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries
 libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information
 libssl1.0.0-udeb - ssl shared library - udeb (udeb)
 openssl    - Secure Sockets Layer toolkit - cryptographic utility
Changes:
 openssl (1.0.1f-1ubuntu7) utopic; urgency=medium
 .
   * SECURITY UPDATE: double free when processing DTLS packets
     - debian/patches/CVE-2014-3505.patch: fix double free in ssl/d1_both.c.
     - CVE-2014-3505
   * SECURITY UPDATE: DTLS memory exhaustion
     - debian/patches/CVE-2014-3506.patch: fix DTLS handshake message size
       checks in ssl/d1_both.c.
     - CVE-2014-3506
   * SECURITY UPDATE: DTLS memory leak from zero-length fragments
     - debian/patches/CVE-2014-3507.patch: fix memory leak and return codes
       in ssl/d1_both.c.
     - CVE-2014-3507
   * SECURITY UPDATE: information leak in pretty printing functions
     - debian/patches/CVE-2014-3508.patch: fix OID handling in
       crypto/asn1/a_object.c, crypto/objects/obj_dat.c.
     - CVE-2014-3508
   * SECURITY UPDATE: race condition in ssl_parse_serverhello_tlsext
     - debian/patches/CVE-2014-3509.patch: fix race in ssl/t1_lib.c.
     - CVE-2014-3509
   * SECURITY UPDATE: DTLS anonymous EC(DH) denial of service
     - debian/patches/CVE-2014-3510.patch: check for server certs in
       ssl/d1_clnt.c, ssl/s3_clnt.c.
     - CVE-2014-3510
   * SECURITY UPDATE: TLS protocol downgrade attack
     - debian/patches/CVE-2014-3511.patch: properly handle fragments in
       ssl/s23_srvr.c.
     - CVE-2014-3511
   * SECURITY UPDATE: SRP buffer overrun
     - debian/patches/CVE-2014-3512.patch: check parameters in
       crypto/srp/srp_lib.c.
     - CVE-2014-3512
   * SECURITY UPDATE: crash with SRP ciphersuite in Server Hello message
     - debian/patches/CVE-2014-5139.patch: fix SRP authentication and make
       sure ciphersuite is set up correctly in ssl/s3_clnt.c, ssl/ssl_lib.c,
       ssl/s3_lib.c, ssl/ssl.h, ssl/ssl_ciph.c, ssl/ssl_locl.h.
     - CVE-2014-5139
Checksums-Sha1:
 d5a3cb0cfaad05865a8bd693b90b42135d32e051 2417 openssl_1.0.1f-1ubuntu7.dsc
 dbe9d66a0f70d11fdc1eb080b96a506d4f15a3f1 104936 openssl_1.0.1f-1ubuntu7.debian.tar.xz
Checksums-Sha256:
 c6ce9d378a44e95e3f9bf03cfe57ede303053b2f89a87c9f35663a6028d5219b 2417 openssl_1.0.1f-1ubuntu7.dsc
 e4f6b2a1016dd49707bd18b8e6149845411fe053ba77f331991a6a4eea09480f 104936 openssl_1.0.1f-1ubuntu7.debian.tar.xz
Files:
 225141c07ed96c0d53528c312412835a 2417 utils optional openssl_1.0.1f-1ubuntu7.dsc
 988840e3d8478e58965fdf4d06b23497 104936 utils optional openssl_1.0.1f-1ubuntu7.debian.tar.xz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=3+or
-----END PGP SIGNATURE-----


More information about the Utopic-changes mailing list