Bug 703

Summary: [SECURITY] Update openssl package to 0.9.8l
Product: buildroot Reporter: Gustavo Zacarias <gustavo>
Component: Outdated packageAssignee: unassigned
Status: RESOLVED FIXED    
Severity: major CC: buildroot
Priority: P5    
Version: unspecified   
Target Milestone: ---   
Hardware: PC   
OS: Linux   
Host: i686-linux Target: arm-softfloat-linux-uclibcgnueabi
Build:
Attachments: Bump openssl package to 0.9.8l + security fixes

Description Gustavo Zacarias 2009-11-10 17:22:21 UTC
Created attachment 731 [details]
Bump openssl package to 0.9.8l + security fixes

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug." 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378
Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak." 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379
Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
Comment 1 Peter Korsgaard 2009-11-15 23:00:35 UTC
Thanks, committed. It would have been good to document why you need openssl-ditch.reject.patch though.