Date: Fri, 12 Oct 2007 15:05:56 +0200 From: Brian Josefsen <none@bj--cold.dk.lh.bsd-dk.dk> To: bsd-dk@bsd-dk.dk Subject: [Fwd: Security fix for openssl] Hvad med F&N bsd
Hej
Modtog netop vedhæftede advisory for OpenBSD, men umiddelbart skulle man
tro at der ville være samme problem med Free og NetBSD. Men har lige
suget src ned for 6-stable, der er ikke noget nyt openssl. Jeg troede
generelt at man fulgtes ad, så man først offentliggjorde fix når man
havde et fix eller en workaround for alle distributørerne?
Håber nogle kan oplyse mig lidt bedre.
-- Mvh Brian Josefsen
attached mail follows:
Date: Fri, 12 Oct 2007 11:39:30 +0200 From: Moritz Jodeit <none@moritz--openbsd.org.lh.bsd-dk.dk> To: security-announce@openbsd.org Subject: Security fix for openssl
Summary: The SSL_get_shared_ciphers() function in OpenSSL contains an off-by-one overflow.
Impact: A client can send a specially prepared list of ciphers to an application using the SSL_get_shared_ciphers() function from the OpenSSL library, potentially resulting in remote code execution.
Fix: A fix has been committed to OpenBSD-current. Patches are available for OpenBSD 4.2, 4.1 and 4.0.
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/002_openssl.patch ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/011_openssl.patch ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/017_openssl.patch
Credits: The bug was found and fixed by Moritz Jodeit (moritz@). Original Adivsory: <http://www.securityfocus.com/archive/1/480855/30/0/threaded>
This archive was generated by hypermail 2b30 : Wed 31 Oct 2007 - 23:00:02 CET