Change logs for openssl source package in 14.09-factory

  • openssl (1.0.1f-1ubuntu7) utopic; urgency=medium
    
      * SECURITY UPDATE: double free when processing DTLS packets
        - debian/patches/CVE-2014-3505.patch: fix double free in ssl/d1_both.c.
        - CVE-2014-3505
      * SECURITY UPDATE: DTLS memory exhaustion
        - debian/patches/CVE-2014-3506.patch: fix DTLS handshake message size
          checks in ssl/d1_both.c.
        - CVE-2014-3506
      * SECURITY UPDATE: DTLS memory leak from zero-length fragments
        - debian/patches/CVE-2014-3507.patch: fix memory leak and return codes
          in ssl/d1_both.c.
        - CVE-2014-3507
      * SECURITY UPDATE: information leak in pretty printing functions
        - debian/patches/CVE-2014-3508.patch: fix OID handling in
          crypto/asn1/a_object.c, crypto/objects/obj_dat.c.
        - CVE-2014-3508
      * SECURITY UPDATE: race condition in ssl_parse_serverhello_tlsext
        - debian/patches/CVE-2014-3509.patch: fix race in ssl/t1_lib.c.
        - CVE-2014-3509
      * SECURITY UPDATE: DTLS anonymous EC(DH) denial of service
        - debian/patches/CVE-2014-3510.patch: check for server certs in
          ssl/d1_clnt.c, ssl/s3_clnt.c.
        - CVE-2014-3510
      * SECURITY UPDATE: TLS protocol downgrade attack
        - debian/patches/CVE-2014-3511.patch: properly handle fragments in
          ssl/s23_srvr.c.
        - CVE-2014-3511
      * SECURITY UPDATE: SRP buffer overrun
        - debian/patches/CVE-2014-3512.patch: check parameters in
          crypto/srp/srp_lib.c.
        - CVE-2014-3512
      * SECURITY UPDATE: crash with SRP ciphersuite in Server Hello message
        - debian/patches/CVE-2014-5139.patch: fix SRP authentication and make
          sure ciphersuite is set up correctly in ssl/s3_clnt.c, ssl/ssl_lib.c,
          ssl/s3_lib.c, ssl/ssl.h, ssl/ssl_ciph.c, ssl/ssl_locl.h.
        - CVE-2014-5139
     -- Marc Deslauriers <email address hidden>   Thu, 07 Aug 2014 09:34:54 -0400