From jkeating@j2solutions.net Sat May 8 14:02:44 2004 From: Jesse Keating To: fedora-legacy-announce@redhat.com Cc: bugtraq@securityfocus.com Date: Sat, 8 May 2004 09:39:40 -0700 Subject: [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated OpenSSL resolves security vulnerability Advisory ID: FLSA:1395 Issue date: 2004-05-08 Product: Red Hat Linux Keywords: Security Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=1395 CVE Names: CAN-2003-0851 CAN-2004-0081 - ----------------------------------------------------------------------- - --------------------------------------------------------------------- 1. Topic: Updated OpenSSL packages that fix remote denial of service vulnerabilities are now available. 2. Relevent releases/architectures: Red Hat Linux 7.2 - i386 i686 Red Hat Linux 7.3 - i386 i686 Red Hat Linux 8.0 - i386 i686 3. Problem description: OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool uncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can lead to a denial of service attack (infinite loop). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0081 to this issue. Testing performed by Novell using a test suite provided by NISCC uncovered an issue in the ASN.1 parser in versions of OpenSSL 0.9.6 prior to 0.9.6l which could cause large recursion and possibly lead to a denial of service attack if used where stack space is limited. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0851 to this issue. These updated packages contain patches provided by the OpenSSL group that protect against these issues. NOTE: Because server applications are affected by this issue, users are advised to either restart all services using OpenSSL functionality or restart their system after installing these updated packages. Fedora Legacy would like to thank Michal Jaegermann for bringing this issue to our attention. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: http://bugzilla.fedora.us - 1395 - openssl vulnerabilties to remote DoS attack 6. RPMs required: Red Hat Linux 7.2: SRPM: http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.2/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm Red Hat Linux 8.0: SRPM: http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl095a-0.9.5a-24.8.legacy.src.rpm http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl-0.9.6b-36.8.legacy.src.rpm http://download.fedoralegacy.org/redhat/8.0/updates/SRPMS/openssl096-0.9.6-24.8.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-devel-0.9.6b-36.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-perl-0.9.6b-36.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl095a-0.9.5a-24.8.legacy.i386.rpm http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl096-0.9.6-24.8.legacy.i386.rpm i686: http://download.fedoralegacy.org/redhat/8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i686.rpm 7. Verification: SHA1 sum Package Name - --------------------------------------------------------------------------- 6125c0171b9bd2c49e2f206fa616c70310262085 7.2/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm 296a86b860209645a73cdd081b03f3fb1d6e437d 7.2/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm 2647596bc3e8d0090af0ea0e9841ba665872a729 7.2/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm fff610245bcd73fce6b78c0e7f4155cf0c627762 7.2/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm f678d1b885a8236301afb4f92da2d451599643ce 7.2/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm 014a4d8fec25dde48ee8f8c14cc5250afc687542 7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm c4403aff66cc3891418f2f4a5fc9632ed87c6f79 7.2/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm 8b3fca54a08ae67a3ee5c5b6dfc0a166a31d9a1c 7.2/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm bfb7a080b0afe36bba4de6431d68110cd30636aa 7.2/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm 6125c0171b9bd2c49e2f206fa616c70310262085 7.3/updates/SRPMS/openssl095a-0.9.5a-24.7.3.legacy.src.rpm 296a86b860209645a73cdd081b03f3fb1d6e437d 7.3/updates/SRPMS/openssl096-0.9.6-25.7.legacy.src.rpm 2647596bc3e8d0090af0ea0e9841ba665872a729 7.3/updates/SRPMS/openssl-0.9.6b-36.7.legacy.src.rpm fff610245bcd73fce6b78c0e7f4155cf0c627762 7.3/updates/i386/openssl095a-0.9.5a-24.7.3.legacy.i386.rpm f678d1b885a8236301afb4f92da2d451599643ce 7.3/updates/i386/openssl096-0.9.6-25.7.legacy.i386.rpm 014a4d8fec25dde48ee8f8c14cc5250afc687542 7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i386.rpm c4403aff66cc3891418f2f4a5fc9632ed87c6f79 7.3/updates/i386/openssl-0.9.6b-36.7.legacy.i686.rpm 8b3fca54a08ae67a3ee5c5b6dfc0a166a31d9a1c 7.3/updates/i386/openssl-devel-0.9.6b-36.7.legacy.i386.rpm bfb7a080b0afe36bba4de6431d68110cd30636aa 7.3/updates/i386/openssl-perl-0.9.6b-36.7.legacy.i386.rpm 6b789ea67363c4a7f23cc1e1363c32509605d5b4 8.0/updates/SRPMS/openssl095a-0.9.5a-24.8.legacy.src.rpm a13a09ee098c126ab7b452f13ae49cc870e0d5d2 8.0/updates/SRPMS/openssl096-0.9.6-24.8.legacy.src.rpm 95ab8bd7b6e649f3e7995830e8f15c3fd55e83bd 8.0/updates/SRPMS/openssl-0.9.6b-36.8.legacy.src.rpm f15faf931188fcc4991cd692eba88ef4dd3e670e 8.0/updates/i386/openssl095a-0.9.5a-24.8.legacy.i386.rpm 5fad5ab9fdbbf48cd725cb9d7edb853f651b0893 8.0/updates/i386/openssl096-0.9.6-24.8.legacy.i386.rpm bb6c9804df5d4214ca80474f2f3e87ddfe298908 8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i386.rpm d49da33be792303a8ea3295076b3a7e5c7a29ea1 8.0/updates/i386/openssl-0.9.6b-36.8.legacy.i686.rpm 7a2494d638beb99b939480fac7d27885b68137e8 8.0/updates/i386/openssl-devel-0.9.6b-36.8.legacy.i386.rpm 7a01c363409dae773a9b7b678abd5c511a580a62 8.0/updates/i386/openssl-perl-0.9.6b-36.8.legacy.i386.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0081 https://rhn.redhat.com/errata/RHSA-2004-119.html https://bugzilla.fedora.us/show_bug.cgi?id=1395 9. Contact: The Fedora Legacy security contact is . More project details at http://www.fedoralegacy.org - --------------------------------------------------------------------- - -- Jesse Keating RHCE (http://geek.j2solutions.net) Fedora Legacy Team (http://www.fedoralegacy.org) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFAnQ1M4v2HLvE71NURAn5/AJ0VIZVW0sE5bgCtYGuUgQfx1RrcNQCguLPc Ykda1gyXWPnCmEcqzx1IPRw= =4X2Q -----END PGP SIGNATURE-----