ALAS-2012-085


Amazon Linux AMI Security Advisory: ALAS-2012-85
Advisory Release Date: 2014-09-14 16:18 Pacific
Severity: Medium

Issue Overview:

An integer underflow flaw, leading to a buffer over-read, was found in the way OpenSSL handled DTLS (Datagram Transport Layer Security) application data record lengths when using a block cipher in CBC (cipher-block chaining) mode. A malicious DTLS client or server could use this flaw to crash its DTLS connection peer. (CVE-2012-2333 )


Affected Packages:

openssl


Issue Correction:
Run yum update openssl to update your system.

New Packages:
i686:
    openssl-static-1.0.0j-1.43.amzn1.i686
    openssl-1.0.0j-1.43.amzn1.i686
    openssl-debuginfo-1.0.0j-1.43.amzn1.i686
    openssl-perl-1.0.0j-1.43.amzn1.i686
    openssl-devel-1.0.0j-1.43.amzn1.i686

src:
    openssl-1.0.0j-1.43.amzn1.src

x86_64:
    openssl-devel-1.0.0j-1.43.amzn1.x86_64
    openssl-perl-1.0.0j-1.43.amzn1.x86_64
    openssl-1.0.0j-1.43.amzn1.x86_64
    openssl-debuginfo-1.0.0j-1.43.amzn1.x86_64
    openssl-static-1.0.0j-1.43.amzn1.x86_64