U radu programskog paketa OpenSSL, za sustave Fedora 15 i 16, uočene su dvije sigurnosne ranjivosti. Napadačima omogućuju zaobilaženje sigurnosnih ograničenja i izvođenje DoS napada.
Paket: | OpenSSL 1.x |
Operacijski sustavi: | Fedora 15, Fedora 16 |
Kritičnost: | 4.4 |
Problem: | pogreška u programskoj funkciji, pogreška u programskoj komponenti |
Iskorištavanje: | udaljeno |
Posljedica: | uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-0884, CVE-2012-1165 |
Izvorni ID preporuke: | FEDORA-2012-4659 |
Izvor: | Fedora |
Problem: | |
Ranjivosti su posljedica pogrešaka u CMS i PKCS #7 dekripcijskom kodu, te greške u funkciji "mime_param_cmp()". |
|
Posljedica: | |
Napadač ih može iskoristiti za zaobilaženje postavljenih ograničenja i izvođenje DoS napada. |
|
Rješenje: | |
Korisnicima se preporuča korištenje nadogradnje. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-4659
2012-03-24 22:43:50
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 15
Version : 1.0.0h
Release : 1.fc15
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
This minor update from upstream fixes two security vulnerabilities with moderate
and low impact.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Mar 23 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0h-1
- new upstream release fixing CVE-2012-0884 - Bleichenbacher attack
against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp
NULL dereference (#802489)
* Thu Jan 19 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0g-1
- new upstream release fixing CVE-2012-0050 - DoS regression in
DTLS support introduced by the previous release (#782795)
* Thu Jan 5 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-2
- fix missing initialization of variable in CHIL engine
* Wed Sep 7 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-1
- new upstream release fixing CVE-2011-3207 (#736088)
* Wed Aug 24 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-8
- drop the separate engine for Intel acceleration improvements
and merge in the AES-NI, SHA1, and RC4 optimizations
- add support for OPENSSL_DISABLE_AES_NI environment variable
that disables the AES-NI support
* Tue Jul 26 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-7
- correct openssl cms help output (#636266)
- more tolerant starttls detection in XMPP protocol (#608239)
* Wed Jul 20 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-6
- add support for newest Intel acceleration improvements backported
from upstream by Intel in form of a separate engine
* Thu Jun 9 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-5
- allow the AES-NI engine in the FIPS mode
* Tue May 24 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-4
- add API necessary for CAVS testing of the new DSA parameter generation
* Thu Apr 28 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-3
- add support for VIA Padlock on 64bit arch from upstream (#617539)
- do not return bogus values from load_certs (#652286)
* Tue Apr 5 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-2
- clarify apps help texts for available digest algorithms (#693858)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #802489 - CVE-2012-1165 openssl: mime_param_cmp NULL dereference
crash
https://bugzilla.redhat.com/show_bug.cgi?id=802489
[ 2 ] Bug #802725 - CVE-2012-0884 openssl: CMS and PKCS#7 Bleichenbacher
attack
https://bugzilla.redhat.com/show_bug.cgi?id=802725
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-4665
2012-03-24 22:44:07
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 16
Version : 1.0.0h
Release : 1.fc16
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
This minor update from upstream fixes two security vulnerabilities with moderate
and low impact.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Mar 23 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0h-1
- new upstream release fixing CVE-2012-0884 - Bleichenbacher attack
against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp
NULL dereference (#802489)
* Thu Jan 19 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0g-1
- new upstream release fixing CVE-2012-0050 - DoS regression in
DTLS support introduced by the previous release (#782795)
* Thu Jan 5 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-2
- fix missing initialization of variable in CHIL engine
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #802489 - CVE-2012-1165 openssl: mime_param_cmp NULL dereference
crash
https://bugzilla.redhat.com/show_bug.cgi?id=802489
[ 2 ] Bug #802725 - CVE-2012-0884 openssl: CMS and PKCS#7 Bleichenbacher
attack
https://bugzilla.redhat.com/show_bug.cgi?id=802725
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke