<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>22817</bug_id>
          
          <creation_ts>2010-01-24 18:18:48 +0300</creation_ts>
          <short_desc>OpenSSL &quot;CRYPTO_free_all_ex_data()&quot; Memory Leak Vulnerability</short_desc>
          <delta_ts>2010-09-30 13:44:10 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>openssl</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>critical</bug_severity>
          <target_milestone>---</target_milestone>
          <dependson>23037</dependson>
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Motsyo Gennadi">drool</reporter>
          <assigned_to name="Gleb F-Malinovskiy">glebfm</assigned_to>
          <cc>glebfm</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>105881</commentid>
    <comment_count>0</comment_count>
    <who name="Motsyo Gennadi">drool</who>
    <bug_when>2010-01-24 18:18:48 +0300</bug_when>
    <thetext>В библиотеке OpenSSL была обнаружена уязвимость, позволяющая злоумышленнику провести DoS атаку через исчерпание доступной памяти. Уязвимая функция CRYPTO_free_all_ex_data() используется в таких приложениях как Apache с модулем PHP

Патч:
http://cvs.openssl.org/chngview?cn=19069

Информация:
http://www.vupen.com/english/advisories/2010/0124
http://www.linux.org.ru/view-message.jsp?msgid=4469757&amp;lastmod=1264332484924</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>105895</commentid>
    <comment_count>1</comment_count>
    <who name="Evgeny Sinelnikov">sin</who>
    <bug_when>2010-01-24 21:56:57 +0300</bug_when>
    <thetext>Будем чинить...

openssl-0.9.8m-beta1, заодно, посмотрю...</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>112900</commentid>
    <comment_count>2</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2010-09-30 13:44:10 +0400</bug_when>
    <thetext>openssl098-0.9.8o-alt1 -&gt; sisyphus:

* Wed Sep 29 2010 Dmitry V. Levin &lt;ldv@altlinux&gt; 0.9.8o-alt1
- Updated to 0.9.8o (fixes CVE-2010-0742).
- Fixed ssl/dtls1.h ABI breakage introduced in 0.9.8m.
- Fixed 0.9.8m build regression on architectures where %_lib != lib.

* Thu Mar 25 2010 Evgeny Sinelnikov &lt;sin@altlinux&gt; 0.9.8n-alt1
- Updated to 0.9.8n (fixes CVE-2010-0740 and CVE-2010-0433).

* Fri Feb 26 2010 Evgeny Sinelnikov &lt;sin@altlinux&gt; 0.9.8m-alt1
- Updated to 0.9.8m with security fixes and improvements, including:
  + CVE-2009-3245, CVE-2008-1678
  + CVE-2009-1377, CVE-2009-1378, CVE-2009-1379
  + CVE-2009-1387 (closes: #20280)
  + CVE-2009-4355 (closes: #22817, #23037)
  + patch for Cisco VPN client DTLS</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>