Unsubscribe—
Sent from my phone

On Thu, Jun 5, 2014 at 9:36 AM, Kurt Roeckx <[email protected]> wrote:

> Package: openssl
> Version: 0.9.8o-4squeeze15
> CVE ID: CVE-2014-0076 CVE-2014-0195 CVE-2014-0221 CVE-2014-3470 CVE-2014-0224
> CVE-2014-0195
>     Jueri Aedla discovered that a buffer overflow in processing DTLS
>     fragments could lead to the execution of arbitrary code or denial
>     of service.
> CVE-2014-0221
>     Imre Rad discovered the processing of DTLS hello packets is
>     susceptible to denial of service.
> CVE-2014-0224
>     KIKUCHI Masashi discovered that carefully crafted handshakes can
>     force the use of weak keys, resulting in potential man-in-the-middle
>     attacks.
> CVE-2014-3470
>     Felix Groebert and Ivan Fratric discovered that the implementation of
>     anonymous ECDH ciphersuites is suspectible to denial of service.
> CVE-2014-0076
>      Fix for the attack described in the paper "Recovering
>      OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
>      Reported by Yuval Yarom and Naomi Benger.
> Additional information can be found at
> http://www.openssl.org/news/secadv_20140605.txt
> All applications linked to openssl need to be restarted. You can
> use the tool checkrestart from the package debian-goodies to
> detect affected programs or reboot your system.
> It's important that you upgrade the libssl0.9.8 package and not
> just the openssl package.

Reply via email to