Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.0310 polarssl security update 8 February 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: polarssl Publisher: Debian Operating System: Debian GNU/Linux 7 Debian GNU/Linux 8 Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-8036 CVE-2015-5291 Original Bulletin: http://www.debian.org/security/2016/dsa-3468 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running polarssl check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3468-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond February 06, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : polarssl CVE ID : CVE-2015-5291 CVE-2015-8036 Debian Bug : 801413 It was discovered that polarssl, a library providing SSL and TLS support, contained two heap-based buffer overflows that could allow a remote attacker to trigger denial of service (via application crash) or arbitrary code execution. For the oldstable distribution (wheezy), these problems have been fixed in version 1.2.9-1~deb7u6. For the stable distribution (jessie), these problems have been fixed in version 1.3.9-2.1+deb8u1. We recommend that you upgrade your polarssl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCgAGBQJWtkfZAAoJEBC+iYPz1Z1kxWEH/1fsiH2n6XQugpHDNHB9Iosz XHKqBylycjr9+RLXk+7HQ0wFeX+R4uKORPUsMK4ryaSpVqUs7vd5qU7obBH+7+XG mvJpTq97vZTY17TI0NWTjMJN44i87p5XLRHMhv5VwdayP/ao72Yvx/aZzu7PRdbw reULAgoYoIt1ln/h824TvFv24BgAGetYT6j6PXmDoYBomcu2xICoGM0aLY1fHAqt qf5NWD+iu6WlLVwRBqu0RAzh/c+NfbLizGkyWGF9sl6svzfbd1Dd/U6osHp42QZK an41m17Z2e3N6hGrKTpvwrAhfx8Gc26z5O1iC1i6g163RiUFHgbDC3sWbEzK7/0= =FmHk - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVrfgkX6ZAP0PgtI9AQKqRQ//a9TKqFpO56/hZu9fdfTMZTh1wOv1DtRt O3cPTJO4R9i2lfZPTvfV2nlTBlojAdRQpprZiiYtjRvMFe559nLATCfFislC3Y5m DiFWm7wci2lVlsj/xpC8/6kyjLOvoD5i8S2eZFHgkZygbUesQ6ymyARSErh6SAJJ +jpfJhZMsLago9E2NTppYZg6j4vQYlwe5R94g+V3512VHZihi+kVcgw5l60oBzED e8ZCvTlMntk5mPuD72hj1nNKIkda59iHZWdzqTnyw6X3GB+gSxyUXy01Lh6BFbFY RKB6sejeQvRO9ANXzQwbACu9YfTLcdrEt8r4ErD6Yw/nSUzTVhZDBahpSdViwhuZ QusD7l/sWlFiX3U77vL/Mq9ATSrRIbbXmCSg/+5hw7uyXSTUa8jCX0TdttZpa2oR 8VF9LS2G0EpFlvK0lM8USGpTW6gK2YbislAAxnuyiCIn8Row7mWsoYHndy814Ahk XpGbZkdFrz2bUlP4FJ5BIs4+K9Uy9le2vx1X2hWCyBnJ15HBM/zzQO9BzWzvIU7B fbzEadbYbI7rdnYv7nWkNwEhR1Z7CvewhA1djlQ/r0Eb8a5lt6zFhvcmCK8PBgYD l8opqsf79FAspKj3VlNYmutVdVQvGPsaagcbMEPafZocZ0EW6z7PNoR2+ugpoPHi TfW8qbdjz5I= =wat1 -----END PGP SIGNATURE-----