Subject: | |
From: | |
Reply To: | |
Date: | Wed, 20 Jan 2010 11:41:55 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: openssl security update
Issue date: 2010-01-19
CVE Names: CVE-2009-2409 CVE-2009-4355
CVE-2009-2409 deprecate MD2 in SSL cert validation (Kaminsky)
CVE-2009-4355 openssl significant memory leak in certain SSLv3 requests
(DoS)
It was found that the OpenSSL library did not properly re-initialize its
internal state in the SSL_library_init() function after previous calls
to the CRYPTO_cleanup_all_ex_data() function, which would cause a memory
leak for each subsequent SSL connection. This flaw could cause server
applications that call those functions during reload, such as a
combination of the Apache HTTP Server, mod_ssl, PHP, and cURL, to
consume all available memory, resulting in a denial of service.
(CVE-2009-4355)
Dan Kaminsky found that browsers could accept certificates with MD2 hash
signatures, even though MD2 is no longer considered a cryptographically
strong algorithm. This could make it easier for an attacker to create a
malicious certificate that would be treated as trusted by a browser.
OpenSSL now disables the use of the MD2 algorithm inside signatures by
default. (CVE-2009-2409)
For the update to take effect, all services linked to the OpenSSL
library must be restarted, or the system rebooted.
SL 5.x
SRPMS:
openssl-0.9.8e-12.el5_4.1.src.rpm
i386:
openssl-0.9.8e-12.el5_4.1.i386.rpm
openssl-0.9.8e-12.el5_4.1.i686.rpm
openssl-devel-0.9.8e-12.el5_4.1.i386.rpm
openssl-perl-0.9.8e-12.el5_4.1.i386.rpm
x86_64:
openssl-0.9.8e-12.el5_4.1.i686.rpm
openssl-0.9.8e-12.el5_4.1.x86_64.rpm
openssl-devel-0.9.8e-12.el5_4.1.i386.rpm
openssl-devel-0.9.8e-12.el5_4.1.x86_64.rpm
openssl-perl-0.9.8e-12.el5_4.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|