Multiple security issues have been found in the Xen virtualisation
solution:
Monthly Archives: June 2015
DSA-3286 xen – security update
Multiple security issues have been found in the Xen virtualisation
solution:
DSA-3287 openssl – security update
Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
Layer toolkit.
DSA-3287 openssl – security update
Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
Layer toolkit.
DSA-3288 libav – security update
Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4
DSA-3288 libav – security update
Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4
DSA-3284 qemu – security update
Several vulnerabilities were discovered in qemu, a fast processor
emulator.
DSA-3285 qemu-kvm – security update
Several vulnerabilities were discovered in qemu-kvm, a full
virtualization solution on x86 hardware.
CVE-2014-8176
The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.
CVE-2015-1788
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.