It was discovered that insufficient length validations in the ASN.1 handling of the OpenSSL crypto library may lead to denial of service when processing a manipulated certificate. For the old stable distribution (etch), this problem has been fixed in version 0.9.8c-4etch5 of the openssl package and in version 0.9.7k-3.1etch3 of the openssl097 package. For the stable distribution (lenny), this problem has been fixed in version 0.9.8g-15+lenny1. For the unstable distribution (sid), this problem has been fixed in version 0.9.8g-16. We recommend that you upgrade your openssl packages.
It was discovered that insufficient length validations in the ASN.1 handling of the OpenSSL crypto library may lead to denial of service when processing a manipulated certificate.
For the old stable distribution (etch), this problem has been fixed in version 0.9.8c-4etch5 of the openssl package and in version 0.9.7k-3.1etch4 of the openssl097 package.
For the stable distribution (lenny), this problem has been fixed in version 0.9.8g-15+lenny1.
For the unstable distribution (sid), this problem has been fixed in version 0.9.8g-16.
We recommend that you upgrade your openssl packages.
MD5 checksums of the listed files are available in the original advisory.