Hi there, There's a notice that 0.9.7m and 0.9.8e have a vulnerability posted here:
http://www.securityfocus.com/bid/25831 and the Debian package maintainer recently sent this: ---------------------------------------------------------------------- Subject: [DSA 1379-1] New openssl packages fix arbitrary code execution [snip] Package : openssl Vulnerability : off-by-one error/buffer overflow Problem type : remote Debian-specific: no CVE Id(s) : CVE-2007-5135 Debian Bug : 444435 An off-by-one error has been identified in the SSL_get_shared_ciphers() routine in the libssl library from OpenSSL, an implementation of Secure Socket Layer cryptographic libraries and utilities. This error could allow an attacker to crash an application making use of OpenSSL's libssl library, or potentially execute arbitrary code in the security context of the user running such an application. For the stable distribution (etch), this problem has been fixed in version 0.9.8c-4etch1. For the old stable distribution (sarge), this problem has been fixed in version 0.9.7e-3sarge5. For the unstable and testing distributions (sid and lenny, respectively), this problem has been fixed in version 0.9.8e-9. [snip] ---------------------------------------------------------------------- yet I see only 0.9.7l and 0.9.8d mentioned here: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135 and nothing on the Openssl site itself. What's the story? -- 73, Ged. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]