A vulnerability has been discovered in OpenSSL, a Secure Socket Layer (SSL) implementation. In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC cipher suites used in SSL and TLS. OpenSSL has been found to be vulnerable to this attack. For the stable distribution (woody) this problem has been fixed in version 0.9.6c-2.woody.2. For the old stable distribution (potato) this problem has been fixed in version 0.9.6c-0.potato.5. Please note that this updates the version from potato-proposed-updates that supersedes the version in potato. For the unstable distribution (sid) this problem has been fixed in version 0.9.7a-1. We recommend that you upgrade your openssl packages.
A vulnerability has been discovered in OpenSSL, a Secure Socket Layer (SSL) implementation. In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC cipher suites used in SSL and TLS. OpenSSL has been found to be vulnerable to this attack.
For the stable distribution (woody) this problem has been fixed in version 0.9.6c-2.woody.2.
For the old stable distribution (potato) this problem has been fixed in version 0.9.6c-0.potato.5. Please note that this updates the version from potato-proposed-updates that supersedes the version in potato.
For the unstable distribution (sid) this problem has been fixed in version 0.9.7a-1.
We recommend that you upgrade your openssl packages.
MD5 checksums of the listed files are available in the original advisory.