You are here
Home > Preporuke > Ranjivost programskog paketa openssl

Ranjivost programskog paketa openssl

  • Detalji os-a: LDE
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2931-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 18, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : openssl
CVE ID : CVE-2014-0198

It was discovered that incorrect memory handling in OpenSSL’s
do_ssl3_write() function could result in denial of service.

The oldstable distribution (squeeze) is not affected.

For the stable distribution (wheezy), this problem has been fixed in
version 1.0.1e-2+deb7u9.

For the testing distribution (jessie), this problem has been fixed in
version 1.0.1g-4.

For the unstable distribution (sid), this problem has been fixed in
version 1.0.1g-4.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=hYGC
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140518125505.GA4117@pisco.westfalen.local

AutorTomislav Protega
Cert idNCERT-REF-2014-05-0046-ADV
CveCVE-2014-0198
ID izvornikaDSA-2931-1
Proizvodopenssl
Izvorhttp://www.debian.org
Top
More in Preporuke
Sigurnosni nedostaci u jezgri operacijskog sustava

Otkriveni su sigurnosni nedostaci u jezgri operacijskog sustava Suse. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog koda, izvođenje napada...

Close