Bug 703 - [SECURITY] Update openssl package to 0.9.8l
Summary: [SECURITY] Update openssl package to 0.9.8l
Status: RESOLVED FIXED
Alias: None
Product: buildroot
Classification: Unclassified
Component: Outdated package (show other bugs)
Version: unspecified
Hardware: PC Linux
: P5 major
Target Milestone: ---
Assignee: unassigned
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-11-10 17:22 UTC by Gustavo Zacarias
Modified: 2009-11-15 23:00 UTC (History)
1 user (show)

See Also:
Host: i686-linux
Target: arm-softfloat-linux-uclibcgnueabi
Build:


Attachments
Bump openssl package to 0.9.8l + security fixes (8.00 KB, patch)
2009-11-10 17:22 UTC, Gustavo Zacarias
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Gustavo Zacarias 2009-11-10 17:22:21 UTC
Created attachment 731 [details]
Bump openssl package to 0.9.8l + security fixes

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug." 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378
Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak." 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379
Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
Comment 1 Peter Korsgaard 2009-11-15 23:00:35 UTC
Thanks, committed. It would have been good to document why you need openssl-ditch.reject.patch though.