openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()

Related Vulnerabilities: CVE-2007-5135   CVE-2006-3738   CVE-2007-3108  

Debian Bug report logs - #444435
openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()

version graph

Reported by: abe@phys.ethz.ch (Axel Beckert)

Date: Fri, 28 Sep 2007 14:18:01 UTC

Severity: critical

Tags: security

Found in versions 0.9.8c-4, 0.9.7e-3sarge4

Fixed in versions openssl/0.9.8e-9, openssl/0.9.8c-4etch4, openssl/0.9.7e-3sarge5

Done: Kurt Roeckx <kurt@roeckx.be>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Axel Beckert <beckert@phys.ethz.ch>, team@security.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to abe@phys.ethz.ch (Axel Beckert):
New Bug report received and forwarded. Copy sent to Axel Beckert <beckert@phys.ethz.ch>, team@security.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: abe@phys.ethz.ch (Axel Beckert)
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 16:16:02 +0200 (CEST)
Package: openssl
Version: 0.9.8c-4, 0.9.7e-3sarge4
Severity: critical
Tags: sarge, etch, security

According to http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 is not
yet available):

Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary
code via a crafted packet that triggers a one-byte buffer underflow.

According to the German IT news magazin "Heise Online", 0.9.7m and
0.9.8e are also affected:
http://www.heise.de/security/news/meldung/96710

Original source seems to be this Bugtraq posting:
http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded

According to this posting, all lower versions are affected, too.

The release dates of 0.9.8e and 0.9.7m and the time line in the above
mentioned Bugtraq posting suggest that not only 0.9.7l and 0.9.8d but
also 0.9.7m and 0.9.8e are affected -- as Heise wrote.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.22.3-amd64-1
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages openssl depends on:
ii  libc6                  2.3.6.ds1-13etch4 GNU C Library: Shared libraries
ii  libssl0.9.8            0.9.8c-4          SSL shared libraries
ii  zlib1g                 1:1.2.3-13        compression library - runtime

openssl recommends no packages.

-- no debconf information




Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #10 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org
Cc: team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 19:16:15 +0200
[Message part 1 (text/plain, inline)]
tags 444435 - sarge etch
clone 444435 -1 
reassign -1 openssl097 0.9.7k-3.1
thanks

On Fri, Sep 28, 2007 at 04:16:02PM +0200, Axel Beckert wrote:
> Package: openssl
> Version: 0.9.8c-4, 0.9.7e-3sarge4
> Severity: critical
> Tags: sarge, etch, security

Since this applies to sid (and oldstable) too, those tags are
just wrong.

So we have those versions:
openssl:
   Oldstable		0.9.7e-3sarge4
   Stable		0.9.8c-4
   Testing		0.9.8e-6
   Unstable		0.9.8e-8

openssl097:
   Stable		0.9.7k-3.1
   Testing              0.9.7k-3.1

openssl096
   Oldstable		0.9.6m-1sarge4

All those versions are probably vulnerable.

I'm not sure if the security team wants to have a DSA covering
oldstable's versions.

> According to http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
> (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 is not
> yet available):

The patch for it seems to be at:
http://cvs.openssl.org/chngview?cn=16587

I've also attached it.



Kurt

> Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
> 0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary
> code via a crafted packet that triggers a one-byte buffer underflow.
> 
> According to the German IT news magazin "Heise Online", 0.9.7m and
> 0.9.8e are also affected:
> http://www.heise.de/security/news/meldung/96710
> 
> Original source seems to be this Bugtraq posting:
> http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
> 
> According to this posting, all lower versions are affected, too.
> 
> The release dates of 0.9.8e and 0.9.7m and the time line in the above
> mentioned Bugtraq posting suggest that not only 0.9.7l and 0.9.8d but
> also 0.9.7m and 0.9.8e are affected -- as Heise wrote.

[CVE-2007-5135.diff (text/x-diff, attachment)]

Tags removed: sarge, etch Request was from Kurt Roeckx <kurt@roeckx.be> to control@bugs.debian.org. (Fri, 28 Sep 2007 17:24:04 GMT) (full text, mbox, link).


Bug 444435 cloned as bug 444460. Request was from Kurt Roeckx <kurt@roeckx.be> to control@bugs.debian.org. (Fri, 28 Sep 2007 17:24:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #19 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org
Cc: team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 19:24:52 +0200
On Fri, Sep 28, 2007 at 07:16:15PM +0200, Kurt Roeckx wrote:
> > Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
> > 0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary
> > code via a crafted packet that triggers a one-byte buffer underflow.

So, it seems to be that CVE-2006-3738 didn't properly fix things.


Kurt





Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #24 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org
Cc: team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 21:53:34 +0200
On Fri, Sep 28, 2007 at 07:16:15PM +0200, Kurt Roeckx wrote:
> On Fri, Sep 28, 2007 at 04:16:02PM +0200, Axel Beckert wrote:
> > Package: openssl
> > Version: 0.9.8c-4, 0.9.7e-3sarge4
> > Severity: critical
> > Tags: sarge, etch, security
> 
> Since this applies to sid (and oldstable) too, those tags are
> just wrong.
> 
> So we have those versions:
> openssl:
>    Oldstable		0.9.7e-3sarge4
>    Stable		0.9.8c-4
>    Testing		0.9.8e-6
>    Unstable		0.9.8e-8

I've uploaded 0.9.8e-9 to unstable.

I've also prepared an upload for stable-security at
people.debian.org/~kroeckx/openssl

Note that openssl_0.9.8c-4etch4_source_i386_amd64.changes
is the only .changes file mentioning the .orig.tar.gz


Kurt





Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Noah Meyerhans <noahm@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #29 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Noah Meyerhans <noahm@debian.org>
To: Kurt Roeckx <kurt@roeckx.be>
Cc: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org, team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 15:59:46 -0400
[Message part 1 (text/plain, inline)]
On Fri, Sep 28, 2007 at 09:53:34PM +0200, Kurt Roeckx wrote:
> 
> I've also prepared an upload for stable-security at
> people.debian.org/~kroeckx/openssl

Thanks.  Is there any chance of fixing this for oldstable?

noah

[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #34 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Noah Meyerhans <noahm@debian.org>
Cc: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org, team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 22:19:11 +0200
On Fri, Sep 28, 2007 at 03:59:46PM -0400, Noah Meyerhans wrote:
> On Fri, Sep 28, 2007 at 09:53:34PM +0200, Kurt Roeckx wrote:
> > 
> > I've also prepared an upload for stable-security at
> > people.debian.org/~kroeckx/openssl
> 
> Thanks.  Is there any chance of fixing this for oldstable?

The security team wasn't interested in doing updates for
oldstable-security before.  I think the version of the
openssl source package in oldstable still has 4 or 5 security
bugs.  The openssl096 has either the same or even more.

I can prepare a packages fixing all of them if you want.

There is still CVE-2007-3108 / #438142 that's present in oldstable and
stable.  This is probably something nobody cares about.

I'll still do one for openssl097 in stable.


Kurt





Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Noah Meyerhans <noahm@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #39 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Noah Meyerhans <noahm@debian.org>
To: Kurt Roeckx <kurt@roeckx.be>
Cc: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org, team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 16:23:37 -0400
[Message part 1 (text/plain, inline)]
On Fri, Sep 28, 2007 at 10:19:11PM +0200, Kurt Roeckx wrote:
> > Thanks.  Is there any chance of fixing this for oldstable?
> 
> The security team wasn't interested in doing updates for
> oldstable-security before.

Eh?  I must have missed that.  We claim to support oldstable for 1 year,
which means we've still got, what, 7 months left of support for it?

> 
> I can prepare a packages fixing all of them if you want.

That would be amazingly helpful and very much appreciated!

noah

[signature.asc (application/pgp-signature, inline)]

Reply sent to Kurt Roeckx <kurt@roeckx.be>:
You have taken responsibility. (full text, mbox, link).


Notification sent to abe@phys.ethz.ch (Axel Beckert):
Bug acknowledged by developer. (full text, mbox, link).


Message #44 received at 444435-close@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: 444435-close@bugs.debian.org
Subject: Bug#444435: fixed in openssl 0.9.8e-9
Date: Fri, 28 Sep 2007 20:47:09 +0000
Source: openssl
Source-Version: 0.9.8e-9

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8e-9_amd64.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-9_amd64.udeb
libcrypto0.9.8-udeb_0.9.8e-9_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-9_i386.udeb
libssl-dev_0.9.8e-9_amd64.deb
  to pool/main/o/openssl/libssl-dev_0.9.8e-9_amd64.deb
libssl-dev_0.9.8e-9_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.8e-9_i386.deb
libssl0.9.8-dbg_0.9.8e-9_amd64.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-9_amd64.deb
libssl0.9.8-dbg_0.9.8e-9_i386.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-9_i386.deb
libssl0.9.8_0.9.8e-9_amd64.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8e-9_amd64.deb
libssl0.9.8_0.9.8e-9_i386.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8e-9_i386.deb
openssl_0.9.8e-9.diff.gz
  to pool/main/o/openssl/openssl_0.9.8e-9.diff.gz
openssl_0.9.8e-9.dsc
  to pool/main/o/openssl/openssl_0.9.8e-9.dsc
openssl_0.9.8e-9_amd64.deb
  to pool/main/o/openssl/openssl_0.9.8e-9_amd64.deb
openssl_0.9.8e-9_i386.deb
  to pool/main/o/openssl/openssl_0.9.8e-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 444435@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <kurt@roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 28 Sep 2007 19:47:33 +0200
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: amd64 i386 source 
Version: 0.9.8e-9
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <kurt@roeckx.be>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 444435
Changes: 
 openssl (0.9.8e-9) unstable; urgency=high
 .
   * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
     (Closes: #444435)
   * Add postgresql-8.2 to the list of services to check.
Files: 
 0764261c16a61aa7f272cf99273923dd 2070734 libdevel optional libssl-dev_0.9.8e-9_i386.deb
 22fdfe4cc8457f3741a7074ea5e50c11 2191446 libdevel optional libssl-dev_0.9.8e-9_amd64.deb
 232f3723ef010dab5c59f182b7052076 2861502 libs important libssl0.9.8_0.9.8e-9_i386.deb
 49bb013a2b9623caa72dd87f3c55494c 813 utils optional openssl_0.9.8e-9.dsc
 535fa172e2f4262ef27d902834383c62 1599292 libdevel extra libssl0.9.8-dbg_0.9.8e-9_amd64.deb
 64ea4f2386e95cfc0e3773b980a215d5 935928 libs important libssl0.9.8_0.9.8e-9_amd64.deb
 9c416998e19cadcab7691e178a5f5000 50621 utils optional openssl_0.9.8e-9.diff.gz
 be86cd043acfc06a0062a7bd5c912d01 1022092 utils optional openssl_0.9.8e-9_amd64.deb
 ca76a5dd03790c03ef0d21916671f5f1 614818 debian-installer optional libcrypto0.9.8-udeb_0.9.8e-9_amd64.udeb
 d5942cea1174c8f132971521987ba6c9 5330906 libdevel extra libssl0.9.8-dbg_0.9.8e-9_i386.deb
 de16bd8e496e1b09c5c78e96d11bda5b 573908 debian-installer optional libcrypto0.9.8-udeb_0.9.8e-9_i386.udeb
 feb63df1e62b0c4413bbcb68fab1ff7c 1016498 utils optional openssl_0.9.8e-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/VftQdwckHJElwsRAkIhAKConnaEmssUPQc8Z+2dI6+tbz0KLwCgx0rv
6Y8EzVWOLWE6g0ClhP9FViA=
=E7wp
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #49 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Noah Meyerhans <noahm@debian.org>
Cc: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org, team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Fri, 28 Sep 2007 23:25:46 +0200
On Fri, Sep 28, 2007 at 04:23:37PM -0400, Noah Meyerhans wrote:
> On Fri, Sep 28, 2007 at 10:19:11PM +0200, Kurt Roeckx wrote:
> > > Thanks.  Is there any chance of fixing this for oldstable?
> > 
> > The security team wasn't interested in doing updates for
> > oldstable-security before.
> 
> Eh?  I must have missed that.  We claim to support oldstable for 1 year,
> which means we've still got, what, 7 months left of support for it?

I might have confused oldstable security updates from before the etch
release, so still covering woody.


Kurt





Information forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#444435; Package openssl. (full text, mbox, link).


Acknowledgement sent to Kurt Roeckx <kurt@roeckx.be>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (full text, mbox, link).


Message #54 received at 444435@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: Axel Beckert <abe@phys.ethz.ch>, 444435@bugs.debian.org
Cc: team@security.debian.org
Subject: Re: [Pkg-openssl-devel] Bug#444435: Bug#444435: openssl: [CVE-2007-5135] Off-by-one error in the SSL_get_shared_ciphers()
Date: Sat, 29 Sep 2007 12:49:17 +0200
> So we have those versions:

			Current			Fixed
> openssl:		
>    Oldstable		0.9.7e-3sarge4		0.9.7e-3sarge5
>    Stable		0.9.8c-4		0.9.8c-4etch4
>    Testing		0.9.8e-6
>    Unstable		0.9.8e-8		0.9.8e-9
> 
> openssl097:
>    Stable		0.9.7k-3.1		0.9.7k-3.1etch4
>    Testing            0.9.7k-3.1
> 
> openssl096
>    Oldstable		0.9.6m-1sarge4		0.9.6m-1sarge5

I've uploaded openssl 0.9.8e-9 to unstable and put the 4 other
versions on:
http://people.debian.org/~kroeckx/openssl


Kurt





Reply sent to Kurt Roeckx <kurt@roeckx.be>:
You have taken responsibility. (full text, mbox, link).


Notification sent to abe@phys.ethz.ch (Axel Beckert):
Bug acknowledged by developer. (full text, mbox, link).


Message #59 received at 444435-close@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: 444435-close@bugs.debian.org
Subject: Bug#444435: fixed in openssl 0.9.8c-4etch4
Date: Wed, 03 Oct 2007 19:56:19 +0000
Source: openssl
Source-Version: 0.9.8c-4etch4

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8c-4etch4_amd64.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch4_amd64.udeb
libssl-dev_0.9.8c-4etch4_amd64.deb
  to pool/main/o/openssl/libssl-dev_0.9.8c-4etch4_amd64.deb
libssl0.9.8-dbg_0.9.8c-4etch4_amd64.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch4_amd64.deb
libssl0.9.8_0.9.8c-4etch4_amd64.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8c-4etch4_amd64.deb
openssl_0.9.8c-4etch4.diff.gz
  to pool/main/o/openssl/openssl_0.9.8c-4etch4.diff.gz
openssl_0.9.8c-4etch4.dsc
  to pool/main/o/openssl/openssl_0.9.8c-4etch4.dsc
openssl_0.9.8c-4etch4_amd64.deb
  to pool/main/o/openssl/openssl_0.9.8c-4etch4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 444435@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <kurt@roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 28 Sep 2007 19:57:00 +0200
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source amd64
Version: 0.9.8c-4etch4
Distribution: stable-security
Urgency: low
Maintainer: noahm@debian.org
Changed-By: Kurt Roeckx <kurt@roeckx.be>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 444435
Changes: 
 openssl (0.9.8c-4etch4) stable-security; urgency=low
 .
   * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
     (Closes: #444435)
   * Add nagios-nrpe-server, clamav-freshclam and clamav-daemon
     to the list of services to check for restart.
Files: 
 c7cee551a6affbac043c05484b6f2e8e 807 utils optional openssl_0.9.8c-4etch4.dsc
 78454bec556bcb4c45129428a766c886 3313857 utils optional openssl_0.9.8c.orig.tar.gz
 1057ca0c69dedda8cec94a820da1d99a 44257 utils optional openssl_0.9.8c-4etch4.diff.gz
 288b472372e826628fbbc45fc8cc285a 1004882 utils optional openssl_0.9.8c-4etch4_amd64.deb
 b2e5ba39115b67c6e1cf7b466bef723f 890368 libs important libssl0.9.8_0.9.8c-4etch4_amd64.deb
 7af4acf0ea362be607fe43de6436f2ef 580040 debian-installer optional libcrypto0.9.8-udeb_0.9.8c-4etch4_amd64.udeb
 54509d057a7351147f0ed2790b5ef103 2179570 libdevel optional libssl-dev_0.9.8c-4etch4_amd64.deb
 ee8129fe12623d4cb2d0fb8736f7bda2 1653348 libdevel extra libssl0.9.8-dbg_0.9.8c-4etch4_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/WO4YrVLjBFATsMRAsQQAJ9fGy3MhXYHh83BjoxJ7c/N036uEACbBzcq
dYJbedxTYo8CWn5IxZktnb8=
=KxXB
-----END PGP SIGNATURE-----





Reply sent to Kurt Roeckx <kurt@roeckx.be>:
You have taken responsibility. (full text, mbox, link).


Notification sent to abe@phys.ethz.ch (Axel Beckert):
Bug acknowledged by developer. (full text, mbox, link).


Message #64 received at 444435-close@bugs.debian.org (full text, mbox, reply):

From: Kurt Roeckx <kurt@roeckx.be>
To: 444435-close@bugs.debian.org
Subject: Bug#444435: fixed in openssl 0.9.7e-3sarge5
Date: Tue, 16 Oct 2007 19:57:26 +0000
Source: openssl
Source-Version: 0.9.7e-3sarge5

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.7-udeb_0.9.7e-3sarge5_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3sarge5_i386.udeb
libssl-dev_0.9.7e-3sarge5_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.7e-3sarge5_i386.deb
libssl0.9.7_0.9.7e-3sarge5_i386.deb
  to pool/main/o/openssl/libssl0.9.7_0.9.7e-3sarge5_i386.deb
openssl_0.9.7e-3sarge5.diff.gz
  to pool/main/o/openssl/openssl_0.9.7e-3sarge5.diff.gz
openssl_0.9.7e-3sarge5.dsc
  to pool/main/o/openssl/openssl_0.9.7e-3sarge5.dsc
openssl_0.9.7e-3sarge5_i386.deb
  to pool/main/o/openssl/openssl_0.9.7e-3sarge5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 444435@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <kurt@roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 29 Sep 2007 11:21:18 +0200
Source: openssl
Binary: libssl-dev openssl libcrypto0.9.7-udeb libssl0.9.7
Architecture: source i386
Version: 0.9.7e-3sarge5
Distribution: oldstable-security
Urgency: low
Maintainer: noahm@debian.org
Changed-By: Kurt Roeckx <kurt@roeckx.be>
Description: 
 libcrypto0.9.7-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.7 - SSL shared libraries
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 444435
Changes: 
 openssl (0.9.7e-3sarge5) oldstable-security; urgency=low
 .
   * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
     (Closes: #444435)
   * Call dh_fixperms before dh_strip so that stripping actually works.
Files: 
 d19d0a6a8faf12e7e2abe6b82409af05 639 utils optional openssl_0.9.7e-3sarge5.dsc
 b64d10acf6285197d3ad8e923883b6d7 30634 utils optional openssl_0.9.7e-3sarge5.diff.gz
 8e96029826588f227906f859bc60667d 916446 utils optional openssl_0.9.7e-3sarge5_i386.deb
 337fe2d6a280d9a761c04c20d434fe9c 2194088 libs standard libssl0.9.7_0.9.7e-3sarge5_i386.deb
 f97dde687e4bddebb7d87cebfb925058 452446 debian-installer optional libcrypto0.9.7-udeb_0.9.7e-3sarge5_i386.udeb
 d104ace51eba364a5ce0a50989eee2a0 2560372 libdevel optional libssl-dev_0.9.7e-3sarge5_i386.deb
package-type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/lWUYrVLjBFATsMRAjNhAJ43cL17ckp8Xv1fLP0DItAVDI5p2ACeOmt9
t+vdxUR1ilb9Z2MKfTemzbw=
=Afif
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 30 Dec 2007 07:30:07 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:49:03 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.