U radu programskog paketa OpenSSL uočeni su sigurnosni propusti. Riječ je o paketu koji omogućuje implementaciju SSL (eng. Secure Sockets Layer) i TLS (eng. Transport Layer Security) sigurnosnih protokola te pruža osnovnu kriptografsku podršku. Propusti se javljaju ako je omogućen SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG i u datoteci "ssl/t1_lib.c". Napadač može iskoristiti propust za DoS (eng. Denial of Service) napad i otkrivanje osjetljivih podataka. Korisnicima je dostupna odgovarajuća nadogradnja koja otklanja sve probleme.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-1273
2011-02-10 20:46:56
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 14
Version : 1.0.0d
Release : 1.fc14
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
This is update to a new upstream release that fixes CVE-2011-0014 - OCSP
stapling vulnerability.
There are also changes updating the FIPS validation related code that should
not affect in any way operation of the OpenSSL library in the non-FIPS mode.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Feb 10 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-1
- new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)
* Tue Feb 8 2011 Fedora Release Engineering <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- 1.0.0c-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
* Fri Feb 4 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0c-3
- add -x931 parameter to openssl genrsa command to use the ANSI X9.31
key generation method
- use FIPS-186-3 method for DSA parameter generation
- add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable
to allow using MD5 when the system is in the maintenance state
even if the /proc fips flag is on
- make openssl pkcs12 command work by default in the FIPS mode
* Mon Jan 24 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0c-2
- listen on ipv6 wildcard in s_server so we accept connections
from both ipv4 and ipv6 (#601612)
- fix openssl speed command so it can be used in the FIPS mode
with FIPS allowed ciphers
* Fri Dec 3 2010 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0c-1
- new upstream version fixing CVE-2010-4180
* Tue Nov 23 2010 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0b-3
- replace the revert for the s390x bignum asm routines with
fix from upstream
* Mon Nov 22 2010 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0b-2
- revert upstream change in s390x bignum asm routines
* Tue Nov 16 2010 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0b-1
- new upstream version fixing CVE-2010-3864 (#649304)
* Tue Sep 7 2010 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0a-3
- make SHLIB_VERSION reflect the library suffix
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #676063 - CVE-2011-0014 openssl: OCSP stapling vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=676063
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke