The followng two security update has been released for Debian GNU/Linux: [SECURITY] [DSA 2622-1] polarssl security update and [SECURITY] [DSA 2621-1] openssl security update
[SECURITY] [DSA 2622-1] polarssl security update
[SECURITY] [DSA 2622-1] polarssl security update
- -------------------------------------------------------------------------[SECURITY] [DSA 2621-1] openssl security update
Debian Security Advisory DSA-2622-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
February 13, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : polarssl
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-0169 CVE-2013-1621 CVE-2013-1622
Debian Bug : 699887
Multiple vulnerabilities have been found in OpenSSL. The Common
Vulnerabilities and Exposures project identifies the following issues:
CVE-2013-0169
A timing side channel attack has been found in CBC padding
allowing an attacker to recover pieces of plaintext via statistical
analysis of crafted packages, known as the "Lucky Thirteen" issue.
CVE-2013-1621
An array index error might allow remote attackers to cause a denial
of service via vectors involving a crafted padding-length value
during validation of CBC padding in a TLS session
CVE-2013-1622
Malformed CBC data in a TLS session could allow remote attackers to
conduct distinguishing attacks via statistical analysis of timing
side-channel data for crafted packets.
For the stable distribution (squeeze), these problems have been fixed in
version 0.12.1-1squeeze1.
For the testing distribution (wheezy), and the unstable distribution
(sid), these problems have been fixed in version 1.1.4-2.
We recommend that you upgrade your polarssl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2621-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
February 13, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openssl
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-0166 CVE-2013-0169
Debian Bug : 699889
Multiple vulnerabilities have been found in OpenSSL. The Common
Vulnerabilities and Exposures project identifies the following issues:
CVE-2013-0166
OpenSSL does not properly perform signature verification for OCSP
responses, which allows remote attackers to cause a denial of
service via an invalid key.
CVE-2013-0169
A timing side channel attack has been found in CBC padding
allowing an attacker to recover pieces of plaintext via statistical
analysis of crafted packages, known as the "Lucky Thirteen" issue.
For the stable distribution (squeeze), these problems have been fixed in
version 0.9.8o-4squeeze14.
For the testing distribution (wheezy), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in
version 1.0.1e-1.
We recommend that you upgrade your openssl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/