You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openssl

Sigurnosni nedostaci programskog paketa openssl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3413-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 04, 2015 https://www.debian.org/security/faq
– ————————————————————————-

Package : openssl
CVE ID : CVE-2015-3194 CVE-2015-3195 CVE-2015-3196

Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2015-3194

Loic Jonas Etienne of Qnective AG discovered that the signature
verification routines will crash with a NULL pointer dereference if
presented with an ASN.1 signature using the RSA PSS algorithm and
absent mask generation function parameter. A remote attacker can
exploit this flaw to crash any certificate verification operation
and mount a denial of service attack.

CVE-2015-3195

Adam Langley of Google/BoringSSL discovered that OpenSSL will leak
memory when presented with a malformed X509_ATTRIBUTE structure.

CVE-2015-3196

A race condition flaw in the handling of PSK identify hints was
discovered, potentially leading to a double free of the identify
hint data.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0.1e-2+deb7u18.

For the stable distribution (jessie), these problems have been fixed in
version 1.0.1k-3+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 1.0.2e-1 or earlier.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Obcn
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2015-12-0018-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa redis

Otkrivena je ranjivost cjelobrojnog prepisivanja koja dovodi do prepisivanja spremnika stoga u programskom paketu redis. Potencijalni udaljeni napadač ranjivost bi...

Close