Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-2131

Published: 24 April 2012

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

Notes

AuthorNote
mdeslaur
1.0.x not affected by CVE-2012-2131
all releases also have second patch to fix incorrect error code
introduced in the fix for CVE-2012-2110

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
upstream
Released (0.9.8w)
hardy
Released (0.9.8g-4ubuntu3.18)
lucid
Released (0.9.8k-7ubuntu8.11)
natty
Released (0.9.8o-5ubuntu1.5)
oneiric Not vulnerable
(1.0.0e-2ubuntu4.4)
Patches:
upstream: http://cvs.openssl.org/chngview?cn=22479
upstream: http://cvs.openssl.org/chngview?cn=22476 (0.9.8-error code)
upstream: http://cvs.openssl.org/chngview?cn=22475 (1.0-error code)
upstream: http://cvs.openssl.org/chngview?cn=22474 (1.0.1-error code)
openssl098
Launchpad, Ubuntu, Debian
upstream
Released (0.9.8w)
hardy Does not exist

lucid Does not exist

natty Does not exist

oneiric
Released (0.9.8o-7ubuntu1.2)