Hi there,

There's a notice that 0.9.7m and 0.9.8e have a vulnerability
posted here:

http://www.securityfocus.com/bid/25831

and the Debian package maintainer recently sent this:
----------------------------------------------------------------------
Subject: [DSA 1379-1] New openssl packages fix arbitrary code execution
[snip]
Package        : openssl
Vulnerability  : off-by-one error/buffer overflow
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-5135
Debian Bug     : 444435

An off-by-one error has been identified in the SSL_get_shared_ciphers()
routine in the libssl library from OpenSSL, an implementation of Secure
Socket Layer cryptographic libraries and utilities.  This error could
allow an attacker to crash an application making use of OpenSSL's libssl
library, or potentially execute arbitrary code in the security context
of the user running such an application.

For the stable distribution (etch), this problem has been fixed in
version 0.9.8c-4etch1.  For the old stable distribution (sarge), this
problem has been fixed in version 0.9.7e-3sarge5.  For the unstable and
testing distributions (sid and lenny, respectively), this problem has
been fixed in version 0.9.8e-9.
[snip]
----------------------------------------------------------------------

yet I see only 0.9.7l and 0.9.8d mentioned here:

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135

and nothing on the Openssl site itself.

What's the story?

--

73,
Ged.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to