[openssl security] OpenSSL SSL_get_shared_ciphers() off-by-one buffer overflow
Bug #146269 reported by
Stephan Rügamer
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Fix Released
|
Undecided
|
Ubuntu Security Team | ||
Dapper |
Fix Released
|
Undecided
|
Unassigned | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
openssl097 (Ubuntu) |
Invalid
|
High
|
Unassigned | ||
Dapper |
Won't Fix
|
Undecided
|
Unassigned | ||
Feisty |
Won't Fix
|
Undecided
|
Unassigned | ||
Gutsy |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: openssl
openssl 0.9.8e and 0.9.7k still have a off-by-one buffer overflow...
this is fixed in latest openssl CVS...
Read about it: http://
And CVS Fix: http://
Please find attached a debdiff against latest version of openssl in gutsy
Changed in openssl: | |
assignee: | nobody → ubuntu-security |
To post a comment you must log in.
openssl (0.9.8e-5ubuntu2) gutsy; urgency=low
[ Jamie Strandboge ] shared_ ciphers( ) results in www.securityfoc us.com/ archive/ 1/archive/ 1/480855/ 100/0/threaded rField
* SECURITY UPDATE: off-by-one error in SSL_get_
buffer overflow
* ssl/ssl_lib.c: applied upstream patch from openssl CVS thanks to
Stephan Hermann
* References:
CVE-2007-5135
http://
Fixes LP: #146269
* Modify Maintainer value to match the DebianMaintaine
specification.
[ Kees Cook ] bn/bn_mont. c: upstream patch from openssl CVS thanks to Debian.
* SECURITY UPDATE: side-channel attacks via BN_from_montgomery function.
* crypto/
* References
CVE-2007-3108
-- Kees Cook <email address hidden> Fri, 28 Sep 2007 13:02:19 -0700