Subject: | |
From: | |
Reply To: | |
Date: | Thu, 15 Nov 2007 14:11:17 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: openssl security and bug fix update
Issue date: 2007-11-15
CVE Names: CVE-2007-3108 CVE-2007-5135
A flaw was found in the SSL_get_shared_ciphers() utility function. An
attacker could send a list of ciphers to an application that used this
function and overrun a buffer by a single byte (CVE-2007-5135). Few
applications make use of this vulnerable function and generally it is used
only when applications are compiled for debugging.
A number of possible side-channel attacks were discovered affecting
OpenSSL. A local attacker could possibly obtain RSA private keys being used
on a system. In practice these attacks would be difficult to perform
outside of a lab environment. This update contains backported patches to
mitigate these issues. (CVE-2007-3108)
As well, these updated packages fix the following bugs:
* multithreaded applications could cause a segmentation fault or deadlock
when calling the random number generator initialization (RAND_poll) in the
OpenSSL library, for a large number of threads simultaneously.
* in certain circumstances, if an application using the OpenSSL library
reused the SSL session cache for multiple purposes (with various parameters
of the SSL protocol), the session parameters could be mismatched.
* a segmentation fault could occur when a corrupted pkcs12 file was being
loaded using the "openssl pkcs12 -in [pkcs12-file]" command, where
[pkcs12-file] is the pkcs12 file.
SL 4.x
SRPMS:
openssl-0.9.7a-43.17.el4_6.1.src.rpm
i386:
openssl-0.9.7a-43.17.1.i386.rpm
openssl-0.9.7a-43.17.1.i686.rpm
openssl-devel-0.9.7a-43.17.1.i386.rpm
openssl-perl-0.9.7a-43.17.1.i386.rpm
x86_64:
openssl-0.9.7a-43.17.1.i686.rpm
openssl-0.9.7a-43.17.1.x86_64.rpm
openssl-devel-0.9.7a-43.17.1.i386.rpm
openssl-devel-0.9.7a-43.17.1.x86_64.rpm
openssl-perl-0.9.7a-43.17.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|