Project

General

Profile

Actions

Bug #823

closed

openssl buffer overflow.

Added by dillon over 16 years ago. Updated over 16 years ago.

Status:
Closed
Priority:
High
Assignee:
-
Category:
-
Target version:
-
Start date:
Due date:
% Done:

0%

Estimated time:

Description

There's an advisory on a security hole in openssl on the FreeBSD lists.
could someone apply the patch to HEAD and REL or (if fixed in later
versions of openssl) upgrade openssl?

fetch http://security.FreeBSD.org/patches/SA-07:08/openssl.patch
-Matt
Actions #1

Updated by corecode over 16 years ago

We have 0.9.8e in the tree. As far as I can tell, this should not be
affected -- at least from looking at the CVE summaries. They all only
talk about <= 0.9.8d. Unfortunately openssl.org doesn't really publish
security issues (in a prominent place).

cheers
simon

Actions #2

Updated by dillon over 16 years ago

:Simon 'corecode' Schubert <> added the comment:
:
:We have 0.9.8e in the tree. As far as I can tell, this should not be
:affected -- at least from looking at the CVE summaries. They all only
:talk about <=3D 0.9.8d. Unfortunately openssl.org doesn't really publish
:security issues (in a prominent place).
:
:cheers
: simon

Ok, I'd appreciate it if someone could check that patch I posted against
what we have in the tree to determine whether our version is ok or not.
Yah, yah, I could do it myself, but I'm trying to push for wider
participation here :-)
-Matt
Actions #3

Updated by eric.j.christeson over 16 years ago

The patch applies to our codebase. I'm trying to ascertain whether or
not 0.9.8e is affected and it seems it should be -- the function in
question is identical between 0.9.8d and 0.9.8e. The function doesn't
appear to be used very much, so it's probably a low-exposure
vulnerability, but that's not really the point, is it? :-) From the
openssl cvs logs, they've checked the fix in on all the branches, but
haven't cut a new release yet, so 0.9.8e is probably vulnerable.

Eric

Actions #4

Updated by corecode over 16 years ago

So why does CVE have misleading information then? Are openssl expecting
everybody to apply a patch instead of them just cutting a new release?

cheers
simon

Actions #5

Updated by corecode over 16 years ago

I see. CVE has a wrong summary. We are vulnerable, openssl didn't cut
a new release yet. See [1] (i.e. 0.9.8e is vulnerable).

I'd actually wait for a couple of days before adding the patch to -HEAD.
Patch can go directly to the release branches.

cheers
simon

[1] http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded

Actions

Also available in: Atom PDF