SCIENTIFIC-LINUX-ERRATA Archives

August 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 14 Aug 2014 13:24:22 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (62 lines)
Synopsis:          Moderate: openssl security update
Advisory ID:       SLSA-2014:1052-1
Issue Date:        2014-08-13
CVE Numbers:       CVE-2014-3508
                   CVE-2014-3505
                   CVE-2014-3506
                   CVE-2014-3510
                   CVE-2014-3509
                   CVE-2014-3507
                   CVE-2014-3511
--

A race condition was found in the way OpenSSL handled ServerHello messages
with an included Supported EC Point Format extension. A malicious server
could possibly use this flaw to cause a multi-threaded TLS/SSL client
using OpenSSL to write into freed memory, causing the client to crash or
execute arbitrary code. (CVE-2014-3509)

It was discovered that the OBJ_obj2txt() function could fail to properly
NUL-terminate its output. This could possibly cause an application using
OpenSSL functions to format fields of X.509 certificates to disclose
portions of its memory. (CVE-2014-3508)

A flaw was found in the way OpenSSL handled fragmented handshake packets.
A man-in-the-middle attacker could use this flaw to force a TLS/SSL server
using OpenSSL to use TLS 1.0, even if both the client and the server
supported newer protocol versions. (CVE-2014-3511)

Multiple flaws were discovered in the way OpenSSL handled DTLS packets. A
remote attacker could use these flaws to cause a DTLS server or client
using OpenSSL to crash or use excessive amounts of memory. (CVE-2014-3505,
CVE-2014-3506, CVE-2014-3507)

A NULL pointer dereference flaw was found in the way OpenSSL performed a
handshake when using the anonymous Diffie-Hellman (DH) key exchange. A
malicious server could cause a DTLS client using OpenSSL to crash if that
client had anonymous DH cipher suites enabled. (CVE-2014-3510)

For the update to take effect, all services linked to the OpenSSL library
(such as httpd and other SSL-enabled services) must be restarted or the
system rebooted.
--

SL6
  x86_64
    openssl-1.0.1e-16.el6_5.15.i686.rpm
    openssl-1.0.1e-16.el6_5.15.x86_64.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.15.x86_64.rpm
    openssl-devel-1.0.1e-16.el6_5.15.i686.rpm
    openssl-devel-1.0.1e-16.el6_5.15.x86_64.rpm
    openssl-perl-1.0.1e-16.el6_5.15.x86_64.rpm
    openssl-static-1.0.1e-16.el6_5.15.x86_64.rpm
  i386
    openssl-1.0.1e-16.el6_5.15.i686.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.15.i686.rpm
    openssl-devel-1.0.1e-16.el6_5.15.i686.rpm
    openssl-perl-1.0.1e-16.el6_5.15.i686.rpm
    openssl-static-1.0.1e-16.el6_5.15.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2