Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenSSL (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenSSL (Aktualisierung)
ID: MDVSA-2010:076-1
Distribution: Mandriva
Plattformen: Mandriva 2009.0
Datum: Di, 20. April 2010, 07:24
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740
Applikationen: OpenSSL
Update von: Mehrere Probleme in OpenSSL

Originalnachricht

This is a multi-part message in MIME format...

------------=_1271713510-24326-7033


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:076-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : openssl
Date : April 19, 2010
Affected: 2009.0
_______________________________________________________________________

Problem Description:

This update fixes several security issues in openssl:
- The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f
through 0.9.8m allows remote attackers to cause a denial of service
(crash) via a malformed record in a TLS connection (CVE-2010-0740)
- OpenSSL before 0.9.8m does not check for a NULL return value
from bn_wexpand function calls which has unspecified impact and
context-dependent attack vectors (CVE-2009-3245)
- The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL
before 0.9.8n, when Kerberos is enabled but Kerberos configuration
files cannot be opened, could allow remote attackers to cause a denial
of service (NULL pointer dereference and daemon crash) (CVE-2010-0433)
- Finally, this update provides support for secure renegotiation,
preventing men-in-the-middle attacks (CVE-2009-3555).

Packages for 2008.0 and 2009.0 are provided due to the Extended
Maintenance Program for those products.

Update:

Packages for 2009.0 are provided due to the Extended Maintenance
Program.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
1f42cf30ee84314be4125a070709d239
2009.0/i586/libopenssl0.9.8-0.9.8h-3.7mdv2009.0.i586.rpm
372bffd962ced1965c33b752def70b8b
2009.0/i586/libopenssl0.9.8-devel-0.9.8h-3.7mdv2009.0.i586.rpm
ace965066796e71bf4ecf4af6bc831c5
2009.0/i586/libopenssl0.9.8-static-devel-0.9.8h-3.7mdv2009.0.i586.rpm
a6e08ca29b012c695e0763f6fd15fac1
2009.0/i586/openssl-0.9.8h-3.7mdv2009.0.i586.rpm
1e1164ec8615415e325166d13c4248cc
2009.0/SRPMS/openssl-0.9.8h-3.7mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
f6748700d01abc7e33053e339575cede
2009.0/x86_64/lib64openssl0.9.8-0.9.8h-3.7mdv2009.0.x86_64.rpm
b53a75b4c732a3371a3bcd0e8ed47481
2009.0/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.7mdv2009.0.x86_64.rpm
187bff89c19e2d65ccc5c640a32d0cc7
2009.0/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.7mdv2009.0.x86_64.rpm
1d6f6fca3b51e498359cbbbde07a4a0e
2009.0/x86_64/openssl-0.9.8h-3.7mdv2009.0.x86_64.rpm
1e1164ec8615415e325166d13c4248cc
2009.0/SRPMS/openssl-0.9.8h-3.7mdv2009.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLzKP9mqjQ0CJFipgRAsUVAJkBjISC/NXul8GxUaeiBPsnb6gRNQCgt+ty
X3hfPZSWARaTxUmX7P/4FDM=
=FrW5
-----END PGP SIGNATURE-----


------------=_1271713510-24326-7033
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1271713510-24326-7033--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung