The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[FLSA-2004:1395] Updated OpenSSL resolves security vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Sat, 8 May 2004 09:39:40 -0700
From: Jesse Keating <[email protected]>
To: [email protected]
Subject: [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability
Cc: [email protected]

=2D----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=2D -----------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated OpenSSL resolves security vulnerability
Advisory ID:       FLSA:1395
Issue date:        2004-05-08
Product:           Red Hat Linux
Ключевые слова: , , , , , , , , , Security,  (найти похожие документы)
Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=3D1395 CVE Names: CAN-2003-0851 CAN-2004-0081 =2D ----------------------------------------------------------------------- =2D --------------------------------------------------------------------- 1. Topic: Updated OpenSSL packages that fix remote denial of service vulnerabilities= =20 are now available. 2. Relevent releases/architectures: Red Hat Linux 7.2 - i386 i686 Red Hat Linux 7.3 - i386 i686 Red Hat Linux 8.0 - i386 i686 3. Problem description: OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and=20 Transport Layer Security (TLS v1) protocols as well as a full-strength=20 general purpose cryptography library. Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool= =20 uncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that=20 can lead to a denial of service attack (infinite loop). The Common=20 Vulnerabilities and Exposures project (cve.mitre.org) has assigned the=20 name CAN-2004-0081 to this issue. Testing performed by Novell using a test suite provided by NISCC uncovered= =20 an issue in the ASN.1 parser in versions of OpenSSL 0.9.6 prior to 0.9.6l=20 which could cause large recursion and possibly lead to a denial of service= =20 attack if used where stack space is limited. The Common Vulnerabilities=20 and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0851=20 to this issue. These updated packages contain patches provided by the OpenSSL group that=20 protect against these issues. NOTE: Because server applications are affected by this issue, users are=20 advised to either restart all services using OpenSSL functionality or=20 restart their system after installing these updated packages. =46edora Legacy would like to thank Michal Jaegermann for bringing this iss= ue=20 to our attention. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those=20 RPMs which are currently installed will be updated. Those RPMs which are=20 not installed but included in the list will not be updated. Note that you= =20 can also use wildcards (*.rpm) if your current directory *only* contains=20 the desired RPMs. Please note that this update is also available via yum and apt. Many=20 people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate= =20 RPMs being upgraded on your system. This assumes that you have yum or=20 apt-get configured for obtaining Fedora Legacy content. Please visit=20 http://www.fedoralegacy.org/docs for directions on how to configure yum=20 and apt-get. 5. Bug IDs fixed: http://bugzilla.fedora.us - 1395 - openssl vulnerabilties to remote DoS=20 attack 6. RPMs required: Red Hat Linux 7.2: SRPM: http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl095a-0.9.5= a-24.7.3.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl-0.9.6b-36= =2E7.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl096-0.9.6-= 25.7.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-0.9.6b-36.= 7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-devel-0.9.= 6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-perl-0.9.6= b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl095a-0.9.5a= =2D24.7.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl096-0.9.6-2= 5.7.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-0.9.6b-36.= 7.legacy.i686.rpm Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl095a-0.9.5= a-24.7.3.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl-0.9.6b-36= =2E7.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl096-0.9.6-= 25.7.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-0.9.6b-36.= 7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-devel-0.9.= 6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-perl-0.9.6= b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl095a-0.9.5a= =2D24.7.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl096-0.9.6-2= 5.7.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-0.9.6b-36.= 7.legacy.i686.rpm Red Hat Linux 8.0: SRPM: http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl095a-0.9.5= a-24.8.legacy.src.rpm http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl-0.9.6b-36= =2E8.legacy.src.rpm http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl096-0.9.6-= 24.8.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-devel-0.9.= 6b-36.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-0.9.6b-36.= 8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-perl-0.9.6= b-36.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl095a-0.9.5a= =2D24.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl096-0.9.6-2= 4.8.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-0.9.6b-36.= 8.legacy.i686.rpm 7. Verification: SHA1 sum Package Name =2D -----------------------------------------------------------------------= =2D--- 6125c0171b9bd2c49e2f206fa616c70310262085 =20 7.2/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm 296a86b860209645a73cdd081b03f3fb1d6e437d =20 7.2/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm 2647596bc3e8d0090af0ea0e9841ba665872a729 =20 7.2/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm fff610245bcd73fce6b78c0e7f4155cf0c627762 =20 7.2/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm f678d1b885a8236301afb4f92da2d451599643ce =20 7.2/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm 014a4d8fec25dde48ee8f8c14cc5250afc687542 =20 7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm c4403aff66cc3891418f2f4a5fc9632ed87c6f79 =20 7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm 8b3fca54a08ae67a3ee5c5b6dfc0a166a31d9a1c =20 7.2/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm bfb7a080b0afe36bba4de6431d68110cd30636aa =20 7.2/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm =20 6125c0171b9bd2c49e2f206fa616c70310262085 =20 7.3/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm 296a86b860209645a73cdd081b03f3fb1d6e437d =20 7.3/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm 2647596bc3e8d0090af0ea0e9841ba665872a729 =20 7.3/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm fff610245bcd73fce6b78c0e7f4155cf0c627762 =20 7.3/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm f678d1b885a8236301afb4f92da2d451599643ce =20 7.3/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm 014a4d8fec25dde48ee8f8c14cc5250afc687542 =20 7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm c4403aff66cc3891418f2f4a5fc9632ed87c6f79 =20 7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm 8b3fca54a08ae67a3ee5c5b6dfc0a166a31d9a1c =20 7.3/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm bfb7a080b0afe36bba4de6431d68110cd30636aa =20 7.3/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm =20 6b789ea67363c4a7f23cc1e1363c32509605d5b4 =20 8.0/updates/SRPMS/openssl095a-0.9.5a-24.8.legacy.src.rpm a13a09ee098c126ab7b452f13ae49cc870e0d5d2 =20 8.0/updates/SRPMS/openssl096-0.9.6-24.8.legacy.src.rpm 95ab8bd7b6e649f3e7995830e8f15c3fd55e83bd =20 8.0/updates/SRPMS/openssl-0.9.6b-36.8.legacy.src.rpm f15faf931188fcc4991cd692eba88ef4dd3e670e =20 8.0/updates/i386/openssl095a-0.9.5a-24.8.legacy.i386.rpm 5fad5ab9fdbbf48cd725cb9d7edb853f651b0893 =20 8.0/updates/i386/openssl096-0.9.6-24.8.legacy.i386.rpm bb6c9804df5d4214ca80474f2f3e87ddfe298908 =20 8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i386.rpm d49da33be792303a8ea3295076b3a7e5c7a29ea1 =20 8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i686.rpm 7a2494d638beb99b939480fac7d27885b68137e8 =20 8.0/updates/i386/openssl-devel-0.9.6b-36.8.legacy.i386.rpm 7a01c363409dae773a9b7b678abd5c511a580a62 =20 8.0/updates/i386/openssl-perl-0.9.6b-36.8.legacy.i386.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2003-0851 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0081 https://rhn.redhat.com/errata/RHSA-2004-119.html https://bugzilla.fedora.us/show_bug.cgi?id=3D1395 9. Contact: The Fedora Legacy security contact is <[email protected]>. More project details at http://www.fedoralegacy.org =2D --------------------------------------------------------------------- =2D --=20 Jesse Keating RHCE (http://geek.j2solutions.net) =46edora Legacy Team (http://www.fedoralegacy.org) =2D----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFAnQ1M4v2HLvE71NURAn5/AJ0VIZVW0sE5bgCtYGuUgQfx1RrcNQCguLPc Ykda1gyXWPnCmEcqzx1IPRw=3D =3D4X2Q =2D----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру