Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-2131

Published: 24 April 2012

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

Notes

AuthorNote
mdeslaur
1.0.x not affected by CVE-2012-2131
all releases also have second patch to fix incorrect error code
introduced in the fix for CVE-2012-2110

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
hardy
Released (0.9.8g-4ubuntu3.18)
lucid
Released (0.9.8k-7ubuntu8.11)
natty
Released (0.9.8o-5ubuntu1.5)
oneiric Not vulnerable
(1.0.0e-2ubuntu4.4)
upstream
Released (0.9.8w)
Patches:
upstream: http://cvs.openssl.org/chngview?cn=22479
upstream: http://cvs.openssl.org/chngview?cn=22476
upstream: http://cvs.openssl.org/chngview?cn=22475
upstream: http://cvs.openssl.org/chngview?cn=22474
openssl098
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

natty Does not exist

oneiric
Released (0.9.8o-7ubuntu1.2)
upstream
Released (0.9.8w)