U radu programskog paketa OpenSSL otkriveno je više nedostataka koje napadači mogu iskoristiti za DoS (eng. Denial of Service) napad, zaobilaženje postavljenih ograničenja i otkrivanje osjetljivih informacija.
Paket:
OpenSSL 1.x
Operacijski sustavi:
Fedora 15, Fedora 16
Kritičnost:
6.8
Problem:
cjelobrojno prepisivanje, pogreška u programskoj funkciji, pogreška u programskoj komponenti
Nedostaci su vezani uz greške u funkcijama "asn1_d2i_read_bio" i "mime_param_cmp", datoteci "crypto/x509/x509_vfy.c" i nepravilnu CMS (eng. Cryptographic Message Syntax) implementaciji .
Posljedica:
Zlonamjerni korisnici mogu iskoristiti propuste za zaobilaženje postavljenih sigurnosnih ograničenja, pregled određenih podataka i DoS napad.
Rješenje:
Svim korisnicima se, kao rješenje problema sigurnosti, savjetuje primjena službenih zakrpi.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8014
2012-05-18 10:00:50
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 16
Version : 1.0.0j
Release : 1.fc16
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
This is new minor upstream update fixing moderate security issue CVE-2012-2333.
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 15 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0j-1
- new upstream release fixing CVE-2012-2333 - improper record
length checking in DTLS
* Fri Apr 20 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0i-1
- new upstream release fixing CVE-2012-2110 - memory corruption
when loading asn1 from BIO
* Fri Mar 23 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0h-1
- new upstream release fixing CVE-2012-0884 - Bleichenbacher attack
against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp
NULL dereference (#802489)
* Thu Jan 19 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0g-1
- new upstream release fixing CVE-2012-0050 - DoS regression in
DTLS support introduced by the previous release (#782795)
* Thu Jan 5 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-2
- fix missing initialization of variable in CHIL engine
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #820686 - CVE-2012-2333 openssl: record length handling integer
underflow
https://bugzilla.redhat.com/show_bug.cgi?id=820686
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8024
2012-05-18 10:02:08
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 15
Version : 1.0.0j
Release : 1.fc15
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
This is new minor upstream update fixing moderate security issue CVE-2012-2333.
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 15 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0j-1
- new upstream release fixing CVE-2012-2333 - improper record
length checking in DTLS
* Fri Apr 20 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0i-1
- new upstream release fixing CVE-2012-2110 - memory corruption
when loading asn1 from BIO
* Fri Mar 23 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0h-1
- new upstream release fixing CVE-2012-0884 - Bleichenbacher attack
against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp
NULL dereference (#802489)
* Thu Jan 19 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0g-1
- new upstream release fixing CVE-2012-0050 - DoS regression in
DTLS support introduced by the previous release (#782795)
* Thu Jan 5 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-2
- fix missing initialization of variable in CHIL engine
* Wed Sep 7 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-1
- new upstream release fixing CVE-2011-3207 (#736088)
* Wed Aug 24 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-8
- drop the separate engine for Intel acceleration improvements
and merge in the AES-NI, SHA1, and RC4 optimizations
- add support for OPENSSL_DISABLE_AES_NI environment variable
that disables the AES-NI support
* Tue Jul 26 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-7
- correct openssl cms help output (#636266)
- more tolerant starttls detection in XMPP protocol (#608239)
* Wed Jul 20 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-6
- add support for newest Intel acceleration improvements backported
from upstream by Intel in form of a separate engine
* Thu Jun 9 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-5
- allow the AES-NI engine in the FIPS mode
* Tue May 24 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-4
- add API necessary for CAVS testing of the new DSA parameter generation
* Thu Apr 28 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-3
- add support for VIA Padlock on 64bit arch from upstream (#617539)
- do not return bogus values from load_certs (#652286)
* Tue Apr 5 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0d-2
- clarify apps help texts for available digest algorithms (#693858)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #820686 - CVE-2012-2333 openssl: record length handling integer
underflow
https://bugzilla.redhat.com/show_bug.cgi?id=820686
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke