Amazon Linux 1 Security Advisory: ALAS-2012-85
Advisory Release Date: 2012-06-10 11:48 Pacific
Advisory Updated Date: 2014-09-14 16:18 Pacific
An integer underflow flaw, leading to a buffer over-read, was found in the way OpenSSL handled DTLS (Datagram Transport Layer Security) application data record lengths when using a block cipher in CBC (cipher-block chaining) mode. A malicious DTLS client or server could use this flaw to crash its DTLS connection peer. (CVE-2012-2333)
Affected Packages:
openssl
Issue Correction:
Run yum update openssl to update your system.
i686:
openssl-static-1.0.0j-1.43.amzn1.i686
openssl-1.0.0j-1.43.amzn1.i686
openssl-debuginfo-1.0.0j-1.43.amzn1.i686
openssl-perl-1.0.0j-1.43.amzn1.i686
openssl-devel-1.0.0j-1.43.amzn1.i686
src:
openssl-1.0.0j-1.43.amzn1.src
x86_64:
openssl-devel-1.0.0j-1.43.amzn1.x86_64
openssl-perl-1.0.0j-1.43.amzn1.x86_64
openssl-1.0.0j-1.43.amzn1.x86_64
openssl-debuginfo-1.0.0j-1.43.amzn1.x86_64
openssl-static-1.0.0j-1.43.amzn1.x86_64