Your message dated Wed, 28 May 2008 18:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#483379: fixed in openssl 0.9.8g-10.1
has caused the Debian Bug report #483379,
regarding openssl: CVE-2008-1672, CVE-2008-0891 multiple security issues
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483379: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483379
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openssl
Version: 0.9.8f-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openssl.

CVE-2008-0891[0]:
| OpenSSL Server Name extension crash
| 
| Testing using the Codenomicon TLS test suite discovered a flaw in the
| handling of server name extension data in OpenSSL 0.9.8f and OpenSSL
| 0.9.8g.  If OpenSSL has been compiled using the non-default TLS server
| name extensions, a remote attacker could send a carefully crafted
| packet to a server application using OpenSSL and cause a crash.

CVE-2008-1672[1]:
| OpenSSL Omit Server Key Exchange message crash
| 
| Testing using the Codenomicon TLS test suite discovered a flaw if the
| 'Server Key exchange message' is omitted from a TLS handshake in
| OpenSSL 0.9.8f and OpenSSL 0.9.8g.  If a client connects to a
| malicious server with particular cipher suites, the server could cause
| the client to crash.

Please not that these discriptions are not yet published on the mitre site.
Check out http://www.openssl.org/news/secadv_20080528.txt in the meantime.

Patches for both issues are attached.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
    http://security-tracker.debian.net/tracker/CVE-2008-0891
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
    http://security-tracker.debian.net/tracker/CVE-2008-1672

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
Index: CHANGES
===================================================================
RCS file: /e/openssl/cvs/openssl/CHANGES,v
retrieving revision 1.1238.2.86
diff -u -r1.1238.2.86 CHANGES
--- CHANGES	28 Feb 2008 13:35:58 -0000	1.1238.2.86
+++ CHANGES	18 Mar 2008 12:06:57 -0000
@@ -4,6 +4,9 @@
 
  Changes between 0.9.8g and 0.9.8h  [xx XXX xxxx]
 
+  *) Fix double free in TLS server name extensions which could lead to a remote
+     crash found by Codenomicon TLS test suite (CVE-2008-0891) [Joe Orton]
+
   *) Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set()
      to get the expected BN_FLG_CONSTTIME behavior.
      [Bodo Moeller (Google)]
Index: ssl/t1_lib.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/t1_lib.c,v
retrieving revision 1.13.2.8
diff -u -r1.13.2.8 t1_lib.c
--- ssl/t1_lib.c	18 Oct 2007 11:39:11 -0000	1.13.2.8
+++ ssl/t1_lib.c	18 Mar 2008 12:06:58 -0000
@@ -381,6 +381,7 @@
 						s->session->tlsext_hostname[len]='\0';
 						if (strlen(s->session->tlsext_hostname) != len) {
 							OPENSSL_free(s->session->tlsext_hostname);
+							s->session->tlsext_hostname = NULL;
 							*al = TLS1_AD_UNRECOGNIZED_NAME;
 							return 0;
 						}
Index: CHANGES
===================================================================
RCS file: /e/openssl/cvs/openssl/CHANGES,v
retrieving revision 1.1238.2.86
diff -u -r1.1238.2.86 CHANGES
--- CHANGES	28 Feb 2008 13:35:58 -0000	1.1238.2.86
+++ CHANGES	22 May 2008 09:19:30 -0000
@@ -4,6 +4,10 @@
 
  Changes between 0.9.8g and 0.9.8h  [xx XXX xxxx]
 
+  *) Fix flaw if 'Server Key exchange message' is omitted from a TLS
+     handshake which could lead to a cilent crash as found using the
+     Codenomicon TLS test suite (CVE-2008-1672) [Steve Henson, Mark Cox]
+
   *) Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set()
      to get the expected BN_FLG_CONSTTIME behavior.
      [Bodo Moeller (Google)]
Index: ssl/s3_clnt.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/s3_clnt.c,v
retrieving revision 1.88.2.12
diff -u -r1.88.2.12 s3_clnt.c
--- ssl/s3_clnt.c	3 Nov 2007 13:07:39 -0000	1.88.2.12
+++ ssl/s3_clnt.c	22 May 2008 09:19:30 -0000
@@ -2061,6 +2061,13 @@
 			{
 			DH *dh_srvr,*dh_clnt;
 
+                        if (s->session->sess_cert == NULL) 
+                                {
+                                ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_UNEXPECTED_MESSAGE);
+                                SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,SSL_R_UNEXPECTED_MESSAGE);
+                                goto err;
+                                }
+
 			if (s->session->sess_cert->peer_dh_tmp != NULL)
 				dh_srvr=s->session->sess_cert->peer_dh_tmp;
 			else

Attachment: pgpjwDDrKmd2l.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 0.9.8g-10.1

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8g-10.1_amd64.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-10.1_amd64.udeb
libssl-dev_0.9.8g-10.1_amd64.deb
  to pool/main/o/openssl/libssl-dev_0.9.8g-10.1_amd64.deb
libssl0.9.8-dbg_0.9.8g-10.1_amd64.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-10.1_amd64.deb
libssl0.9.8_0.9.8g-10.1_amd64.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8g-10.1_amd64.deb
openssl_0.9.8g-10.1.diff.gz
  to pool/main/o/openssl/openssl_0.9.8g-10.1.diff.gz
openssl_0.9.8g-10.1.dsc
  to pool/main/o/openssl/openssl_0.9.8g-10.1.dsc
openssl_0.9.8g-10.1_amd64.deb
  to pool/main/o/openssl/openssl_0.9.8g-10.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 27 May 2008 11:13:44 +0200
Source: openssl
Binary: openssl libssl0.9.8 libcrypto0.9.8-udeb libssl-dev libssl0.9.8-dbg
Architecture: source amd64
Version: 0.9.8g-10.1
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSL Team <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 483379 483379
Changes: 
 openssl (0.9.8g-10.1) unstable; urgency=high
 .
   * Non-maintainer upload by the Security team.
   * Fix denial of service if the 'Server Key exchange message'
     is omitted from a TLS handshake which could lead to a client
     crash (CVE-2008-1672; Closes: #483379).
     This only works if openssl is compiled with enable-tlsext which is
     done in Debian.
   * Fix double free in TLS server name extension which leads to a remote
     denial of service (CVE-2008-0891; Closes: #483379).
Checksums-Sha1: 
 3f53fca87243ff7f1ec1392779c9a933d9254b83 1193 openssl_0.9.8g-10.1.dsc
 6ae4560a758010d46b0a4256e17c0582dfda0666 52923 openssl_0.9.8g-10.1.diff.gz
 8a25ad165246487f5650153078f9b2ae456351be 1031246 openssl_0.9.8g-10.1_amd64.deb
 1f2c0c7f760529545007a7005963ea387213053b 951154 
libssl0.9.8_0.9.8g-10.1_amd64.deb
 3cffda31eaab4829a0b72428357fea3b14a785d5 617266 
libcrypto0.9.8-udeb_0.9.8g-10.1_amd64.udeb
 77b4edd39a7f2f49837399003df1451cb19e1e05 2220612 
libssl-dev_0.9.8g-10.1_amd64.deb
 efac21bb7f183b5252b15a5ab7da66abdf3ddb71 1612692 
libssl0.9.8-dbg_0.9.8g-10.1_amd64.deb
Checksums-Sha256: 
 c1227969267fec3e72b77a7fba9fbb7e355cb9c1a652bc0f7515f55c8b20a518 1193 
openssl_0.9.8g-10.1.dsc
 ddde2ba28e940fbe99d98772f2ca1c425f1e73978e5f150939d560bea2ad040b 52923 
openssl_0.9.8g-10.1.diff.gz
 5816544ad6197f75d2b2a97ff1104f60730653de04ad8ce43c8d34ae1f54909b 1031246 
openssl_0.9.8g-10.1_amd64.deb
 2429626d9ca433e01001345c125d9244806eb8cc431015a4d6196e50dd337ae8 951154 
libssl0.9.8_0.9.8g-10.1_amd64.deb
 6054a80cc17b823a9039f24838301d84d6103da6b42cc59c2180608a6b89251b 617266 
libcrypto0.9.8-udeb_0.9.8g-10.1_amd64.udeb
 9183fda17e83a635192e4eb9f32664a0af8b0948e00ef9cdc375049504b58de8 2220612 
libssl-dev_0.9.8g-10.1_amd64.deb
 c47e2225740b98c821a646cc3ea42bace39a6770237492b5589459e3e86381f5 1612692 
libssl0.9.8-dbg_0.9.8g-10.1_amd64.deb
Files: 
 aa39077a394b8a2703c4460187e877c9 1193 utils optional openssl_0.9.8g-10.1.dsc
 d3afc44792abe1fbbf8281ffa6fbcbce 52923 utils optional 
openssl_0.9.8g-10.1.diff.gz
 4c766c8c8134eee816435e12d6f15040 1031246 utils optional 
openssl_0.9.8g-10.1_amd64.deb
 212f823095a2639b1baf1dc5278cad4d 951154 libs important 
libssl0.9.8_0.9.8g-10.1_amd64.deb
 29bdc341387b0db7ae172fff19cff6ab 617266 debian-installer optional 
libcrypto0.9.8-udeb_0.9.8g-10.1_amd64.udeb
 7003c933b093cb4be19294d96e1e81fc 2220612 libdevel optional 
libssl-dev_0.9.8g-10.1_amd64.deb
 952d370d39d68d01f7d042b50729f92b 1612692 libdevel extra 
libssl0.9.8-dbg_0.9.8g-10.1_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIPaPEHYflSXNkfP8RAi5TAJ4pcyvUA/ZIlJ8JnBAst8xiB1e5zACeNK4G
aGjzEJILiURSGdXH3of3CC0=
=RlEF
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to