[ubuntu/karmic] openssl 0.9.8g-16ubuntu2 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Fri Jul 10 21:40:13 BST 2009


openssl (0.9.8g-16ubuntu2) karmic; urgency=low

  * Patches forward ported from http://www.ubuntu.com/usn/USN-792-1 (by
    Marc Deslauriers)
  * SECURITY UPDATE: denial of service via memory consumption from large
    number of future epoch DTLS records.
    - crypto/pqueue.*: add new pqueue_size counter function.
    - ssl/d1_pkt.c: use pqueue_size to limit size of queue to 100.
    - http://cvs.openssl.org/chngview?cn=18187
    - CVE-2009-1377
  * SECURITY UPDATE: denial of service via memory consumption from
    duplicate or invalid sequence numbers in DTLS records.
    - ssl/d1_both.c: discard message if it's a duplicate or too far in the
      future.
    - http://marc.info/?l=openssl-dev&m=124263491424212&w=2
    - CVE-2009-1378
  * SECURITY UPDATE: denial of service or other impact via use-after-free
    in dtls1_retrieve_buffered_fragment.
    - ssl/d1_both.c: use temp frag_len instead of freed frag.
    - http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
    - CVE-2009-1379
  * SECURITY UPDATE: denial of service via DTLS ChangeCipherSpec packet
    that occurs before ClientHello.
    - ssl/s3_pkt.c: abort if s->session is NULL.
    - ssl/{ssl.h,ssl_err.c}: add new error codes.
    - http://cvs.openssl.org/chngview?cn=17369
    - CVE-2009-1386
  * SECURITY UPDATE: denial of service via an out-of-sequence DTLS
    handshake message.
    - ssl/d1_both.c: don't buffer fragments with no data.
    - http://cvs.openssl.org/chngview?cn=17958
    - CVE-2009-1387

Date: Fri, 10 Jul 2009 14:44:47 -0500
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/karmic/+source/openssl/0.9.8g-16ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 10 Jul 2009 14:44:47 -0500
Source: openssl
Binary: openssl openssl-doc libssl0.9.8 libcrypto0.9.8-udeb libssl-dev libssl0.9.8-dbg
Architecture: source
Version: 0.9.8g-16ubuntu2
Distribution: karmic
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
 openssl-doc - Secure Socket Layer (SSL) documentation
Changes: 
 openssl (0.9.8g-16ubuntu2) karmic; urgency=low
 .
   * Patches forward ported from http://www.ubuntu.com/usn/USN-792-1 (by
     Marc Deslauriers)
   * SECURITY UPDATE: denial of service via memory consumption from large
     number of future epoch DTLS records.
     - crypto/pqueue.*: add new pqueue_size counter function.
     - ssl/d1_pkt.c: use pqueue_size to limit size of queue to 100.
     - http://cvs.openssl.org/chngview?cn=18187
     - CVE-2009-1377
   * SECURITY UPDATE: denial of service via memory consumption from
     duplicate or invalid sequence numbers in DTLS records.
     - ssl/d1_both.c: discard message if it's a duplicate or too far in the
       future.
     - http://marc.info/?l=openssl-dev&m=124263491424212&w=2
     - CVE-2009-1378
   * SECURITY UPDATE: denial of service or other impact via use-after-free
     in dtls1_retrieve_buffered_fragment.
     - ssl/d1_both.c: use temp frag_len instead of freed frag.
     - http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
     - CVE-2009-1379
   * SECURITY UPDATE: denial of service via DTLS ChangeCipherSpec packet
     that occurs before ClientHello.
     - ssl/s3_pkt.c: abort if s->session is NULL.
     - ssl/{ssl.h,ssl_err.c}: add new error codes.
     - http://cvs.openssl.org/chngview?cn=17369
     - CVE-2009-1386
   * SECURITY UPDATE: denial of service via an out-of-sequence DTLS
     handshake message.
     - ssl/d1_both.c: don't buffer fragments with no data.
     - http://cvs.openssl.org/chngview?cn=17958
     - CVE-2009-1387
Checksums-Sha1: 
 51fb52d658e21aa0f5526f03001179e7712b1fe9 1429 openssl_0.9.8g-16ubuntu2.dsc
 5b0b97f172fdcf300a2b3a7be0c70d8780548e63 61210 openssl_0.9.8g-16ubuntu2.diff.gz
Checksums-Sha256: 
 6971679e0920f3d366762b3632ce222247ba37a2e05819c2e95f6359bf8cbfa9 1429 openssl_0.9.8g-16ubuntu2.dsc
 6113e5b3425c9c84c89bdf9cdcb707b3ea777559617c3b2e0757cade13231b1d 61210 openssl_0.9.8g-16ubuntu2.diff.gz
Files: 
 bb42a86bbec3b4c2ed284e954cd5ac07 1429 utils optional openssl_0.9.8g-16ubuntu2.dsc
 fe04b5d35989d49e08b7890723e48847 61210 utils optional openssl_0.9.8g-16ubuntu2.diff.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpXpasACgkQW0JvuRdL8Bqf6wCfbjl7uaORO4ysFE5/NiGGAXFr
gVMAn2jJ6zTV9QPKoq2+uo0QKarJME+I
=MB2l
-----END PGP SIGNATURE-----


More information about the Karmic-changes mailing list