U radu programskog paketa openssl otkriveni su i ispravljeni višestruki propusti koje je udaljeni napadač mogao iskoristiti za izvođenje DoS napada te čitanje osjetljivih podataka.
Paket: | OpenSSL 1.x |
Operacijski sustavi: | SUSE Linux Enterprise Desktop 10, SUSE Linux Enterprise Desktop 11, SUSE Linux Enterprise Server (SLES) 10, SUSE Linux Enterprise Server (SLES) 11 |
Kritičnost: | 9.3 |
Problem: | cjelobrojno prepisivanje, pogreška u programskoj funkciji, preljev međuspremnika |
Iskorištavanje: | udaljeno |
Posljedica: | otkrivanje osjetljivih informacija, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-2333, CVE-2006-7250, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4619, CVE-2012-0050, CVE-2012-1165, CVE-2012-2110, CVE-2012-2131 |
Izvorni ID preporuke: | SUSE-SU-2012:0679-1 |
Izvor: | SUSE |
Problem: | |
Propusti su posljedica pogrešaka u funkcijama "mime_hdr_cmp", "mime_param_cmp" i "asn1_d2i_read_bio", datoteci "crypto/buffer/buffer.c" te implementacijama DTLS, SGC i SSL. |
|
Posljedica: | |
Navedene propuste moguće je iskoristiti za izvođenje DoS napada ili otkrivanje osjetljivih informacija. |
|
Rješenje: | |
Svim se korisnicima navedenog programskog paketa, u svrhu zaštite sigurnosti, savjetuje njegova nadogradnja na novije inačice. |
Izvorni tekst preporuke
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0679-1
Rating: important
References: #749735 #761838
Cross-References: CVE-2012-2333
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update of openssl fixes the following denial of
service vulnerabilities:
* Denial of Service via CBC mode handling.
(CVE-2012-2333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
> )
* A deadlock condition introduced by the previous
memory leak fix due to entering a lock twice. This would
only happen in multithreaded programs.
In addition, openssl's cms subcommand (Crypthographic
Message Syntax) has been enabled.
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-0.9.8a-18.70.5
openssl-devel-0.9.8a-18.70.5
openssl-doc-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
openssl-32bit-0.9.8a-18.70.5
openssl-devel-32bit-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (ia64):
openssl-x86-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (ppc):
openssl-64bit-0.9.8a-18.70.5
openssl-devel-64bit-0.9.8a-18.70.5
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
openssl-0.9.8a-18.70.5
openssl-devel-0.9.8a-18.70.5
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
openssl-32bit-0.9.8a-18.70.5
openssl-devel-32bit-0.9.8a-18.70.5
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-doc-0.9.8a-18.70.5
References:
http://support.novell.com/security/cve/CVE-2012-2333.html
https://bugzilla.novell.com/749735
https://bugzilla.novell.com/761838
http://download.novell.com/patch/finder/?keywords=72e4e6bb5a3e9c48dd5cb873ce95abda
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0678-1
Rating: important
References: #749735 #761324 #761838
Cross-References: CVE-2012-2333
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available. It includes one version update.
Description:
This update of openssl fixes the following denial of
service vulnerabilities:
* Denial of Service via CBC mode handling.
(CVE-2012-2333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
> )
* A deadlock condition introduced by the previous
memory leak fix due to entering a lock twice. This would
only happen in multithreaded programs.
In addition, openssl's cms subcommand (Crypthographic
Message Syntax) has been enabled.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-libopenssl-devel-6350
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-libopenssl-devel-6350
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libopenssl-devel-6350
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64
s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.38.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64
s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New
Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version:
0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version:
0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version:
0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New
Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version:
0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
References:
http://support.novell.com/security/cve/CVE-2012-2333.html
https://bugzilla.novell.com/749735
https://bugzilla.novell.com/761324
https://bugzilla.novell.com/761838
http://download.novell.com/patch/finder/?keywords=6a3dc7cf4062c03f840c24ec20e76c62
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0674-1
Rating: important
References: #739719 #742821 #748738 #749210 #749213 #749735
#751946 #758060 #761838
Cross-References: CVE-2006-7250 CVE-2011-4108 CVE-2011-4109
CVE-2011-4576 CVE-2011-4619 CVE-2012-0050
CVE-2012-1165 CVE-2012-2110 CVE-2012-2131
CVE-2012-2333
Affected Products:
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update of openssl fixes the following security issues:
* Denial of Service or crash via CBC mode handling.
(CVE-2012-2333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
> )
* Incorrect integer conversions that could result in
memory corruption. (CVE-2012-2110
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
> , CVE-2012-2131
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
> )
* Potential memory leak in multithreaded key creation.
* Symmetric crypto errors in PKCS7_decrypt.
* Free headers after use in error message.
* S/MIME verification may erroneously fail.
* Tolerating bad MIME headers in ANS.1 parser.
(CVE-2012-1165
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165
> , CVE-2006-7250
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250
> )
* DTLS DoS Attack. (CVE-2012-0050
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050
> )
* DTLS Plaintext Recovery Attack. (CVE-2011-4108
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
> )
* Double-free in Policy Checks. (CVE-2011-4109
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
> )
* Uninitialized SSL 3.0 Padding. (CVE-2011-4576
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
> )
* SGC Restart DoS Attack. (CVE-2011-4619
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
> )
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
openssl-0.9.8a-18.45.63.1
openssl-devel-0.9.8a-18.45.63.1
openssl-doc-0.9.8a-18.45.63.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
openssl-32bit-0.9.8a-18.45.63.1
openssl-devel-32bit-0.9.8a-18.45.63.1
References:
http://support.novell.com/security/cve/CVE-2006-7250.html
http://support.novell.com/security/cve/CVE-2011-4108.html
http://support.novell.com/security/cve/CVE-2011-4109.html
http://support.novell.com/security/cve/CVE-2011-4576.html
http://support.novell.com/security/cve/CVE-2011-4619.html
http://support.novell.com/security/cve/CVE-2012-0050.html
http://support.novell.com/security/cve/CVE-2012-1165.html
http://support.novell.com/security/cve/CVE-2012-2110.html
http://support.novell.com/security/cve/CVE-2012-2131.html
http://support.novell.com/security/cve/CVE-2012-2333.html
https://bugzilla.novell.com/739719
https://bugzilla.novell.com/742821
https://bugzilla.novell.com/748738
https://bugzilla.novell.com/749210
https://bugzilla.novell.com/749213
https://bugzilla.novell.com/749735
https://bugzilla.novell.com/751946
https://bugzilla.novell.com/758060
https://bugzilla.novell.com/761838
http://download.novell.com/patch/finder/?keywords=615504b4f83955616ed79d66c69aaaae
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke