Описание
ELSA-2012-0518: openssl security update (IMPORTANT)
openssl: [1.0.0-20.4]
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)
openssl098e: [0.9.8e-17.el6_2.2]
- Updated the description
[0.9.8e-17.2]
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
openssl
0.9.8e-22.el5_8.3
openssl-devel
0.9.8e-22.el5_8.3
openssl-perl
0.9.8e-22.el5_8.3
openssl097a
0.9.7a-11.el5_8.2
Oracle Linux x86_64
openssl
0.9.8e-22.el5_8.3
openssl-devel
0.9.8e-22.el5_8.3
openssl-perl
0.9.8e-22.el5_8.3
openssl097a
0.9.7a-11.el5_8.2
Oracle Linux i386
openssl
0.9.8e-22.el5_8.3
openssl-devel
0.9.8e-22.el5_8.3
openssl-perl
0.9.8e-22.el5_8.3
openssl097a
0.9.7a-11.el5_8.2
Oracle Linux 6
Oracle Linux x86_64
openssl
1.0.0-20.el6_2.4
openssl-devel
1.0.0-20.el6_2.4
openssl-perl
1.0.0-20.el6_2.4
openssl-static
1.0.0-20.el6_2.4
openssl098e
0.9.8e-17.0.1.el6_2.2
Oracle Linux i686
openssl
1.0.0-20.el6_2.4
openssl-devel
1.0.0-20.el6_2.4
openssl-perl
1.0.0-20.el6_2.4
openssl-static
1.0.0-20.el6_2.4
openssl098e
0.9.8e-17.0.1.el6_2.2
Связанные CVE
Связанные уязвимости
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL be ...
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.