Comment 5 for bug 62390

Revision history for this message
Martin Pitt (pitti) wrote :

 openssl097 (0.9.7g-5ubuntu1.1) dapper-security; urgency=low
 .
   * SECURITY UPDATE: Multiple vulnerabilities.
   * Apply http://www.openssl.org/news/patch-CVE-2006-4339.txt:
     - Check excessive data in padding of PKCS #1 v1.5 signatures to prevent
       applications from incorrectly verifying the certificate. [CVE-2006-4339]
     - http://www.openssl.org/news/secadv_20060905.txt
   * crypto/asn1/tasn_dec.c, asn1_d2i_ex_primitive(): Initialize 'ret' to avoid
     an infinite loop in some circumstances. [CVE-2006-2937]
   * ssl/ssl_lib.c, SSL_get_shared_ciphers(): Fix len comparison to correctly
     handle invalid long cipher list strings. [CVE-2006-3738]
   * ssl/s2_clnt.c, get_server_hello(): Check for NULL session certificate to
     avoid client crash with malicious server responses. [CVE-2006-4343]
   * Certain types of public key could take disproportionate amounts of time to
     process. Apply patch from Bodo Moeller to impose limits to public key type
     values (similar to Mozilla's libnss). Fixes CPU usage/memory DoS. [CVE-2006-2940]

Just released, should be on the mirrors in about two hours.