Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenSSL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenSSL
ID: SSA:2015-009-01
Distribution: Slackware
Plattformen: Slackware -current, Slackware 13.0, Slackware x86_64 13.0, Slackware x86_64 -current, Slackware x86_64 13.1, Slackware 13.1, Slackware x86_64 13.37, Slackware 13.37, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1
Datum: Fr, 9. Januar 2015, 23:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openssl (SSA:2015-009-01)

New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-1.0.1k-i486-1_slack14.1.txz: Upgraded.
This update fixes several security issues:
DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
no-ssl3 configuration sets method to NULL (CVE-2014-3569)
ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
DH client certificates accepted without verification [Server]
(CVE-2015-0205)
Certificate fingerprints can be modified (CVE-2014-8275)
Bignum squaring may produce incorrect results (CVE-2014-3570)
For more information, see:
https://www.openssl.org/news/secadv_20150108.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
(* Security fix *)
patches/packages/openssl-solibs-1.0.1k-i486-1_slack14.1.txz: Upgraded.
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 13.0:
openssl-0.9.8zd-i486-1_slack13.0.txz
openssl-solibs-0.9.8zd-i486-1_slack13.0.txz

Updated packages for Slackware x86_64 13.0:
openssl-0.9.8zd-x86_64-1_slack13.0.txz
openssl-solibs-0.9.8zd-x86_64-1_slack13.0.txz

Updated packages for Slackware 13.1:
openssl-0.9.8zd-i486-1_slack13.1.txz
openssl-solibs-0.9.8zd-i486-1_slack13.1.txz

Updated packages for Slackware x86_64 13.1:
openssl-0.9.8zd-x86_64-1_slack13.1.txz
openssl-solibs-0.9.8zd-x86_64-1_slack13.1.txz

Updated packages for Slackware 13.37:
openssl-0.9.8zd-i486-1_slack13.37.txz
openssl-solibs-0.9.8zd-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37:
openssl-0.9.8zd-x86_64-1_slack13.37.txz
openssl-solibs-0.9.8zd-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0:
openssl-1.0.1k-i486-1_slack14.0.txz
openssl-solibs-1.0.1k-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0:
openssl-1.0.1k-x86_64-1_slack14.0.txz
openssl-solibs-1.0.1k-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1:
openssl-1.0.1k-i486-1_slack14.1.txz
openssl-solibs-1.0.1k-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1:
openssl-1.0.1k-x86_64-1_slack14.1.txz
openssl-solibs-1.0.1k-x86_64-1_slack14.1.txz

Updated packages for Slackware -current:
openssl-solibs-1.0.1k-i486-1.txz
openssl-1.0.1k-i486-1.txz

Updated packages for Slackware x86_64 -current:
openssl-solibs-1.0.1k-x86_64-1.txz
openssl-1.0.1k-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 packages:
7011638e44786670642a29b13adbb4cd openssl-0.9.8zd-i486-1_slack13.0.txz
239cd5697b2633e68aae60f84728ec3d openssl-solibs-0.9.8zd-i486-1_slack13.0.txz

Slackware x86_64 13.0 packages:
953f3ea84349050f9075d69f190c4ef0 openssl-0.9.8zd-x86_64-1_slack13.0.txz
e4cb8384a1a5fd0730f47b0d66844973 openssl-solibs-0.9.8zd-x86_64-1_slack13.0.txz

Slackware 13.1 packages:
60a91060b530795c3aec7776e559069b openssl-0.9.8zd-i486-1_slack13.1.txz
25833ee7c47234dfc57333e4e6ac9516 openssl-solibs-0.9.8zd-i486-1_slack13.1.txz

Slackware x86_64 13.1 packages:
936f04a96087ac8b242fc468ab4902af openssl-0.9.8zd-x86_64-1_slack13.1.txz
2e822308f12b71adbe1d63d3bb7dac44 openssl-solibs-0.9.8zd-x86_64-1_slack13.1.txz

Slackware 13.37 packages:
90d89193c9625543a0b22595ba6e6989 openssl-0.9.8zd-i486-1_slack13.37.txz
83d2ba9b537949d5a882433c19232049 openssl-solibs-0.9.8zd-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages:
644c8acaf2ea6f5ea6fd197ee3d367f9 openssl-0.9.8zd-x86_64-1_slack13.37.txz
ebbae4f2e239906132fddbc8cc1f64cb
openssl-solibs-0.9.8zd-x86_64-1_slack13.37.txz

Slackware 14.0 packages:
4400c395a2de5b68e880a76092dadd47 openssl-1.0.1k-i486-1_slack14.0.txz
b2455038898a8715310f4ab732c11f71 openssl-solibs-1.0.1k-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages:
f912cf9ec0d25495b1534c61563541be openssl-1.0.1k-x86_64-1_slack14.0.txz
4eeed382d27de024e4f9e69aec1c148d openssl-solibs-1.0.1k-x86_64-1_slack14.0.txz

Slackware 14.1 packages:
299f48c01718e425e44844f54b34199d openssl-1.0.1k-i486-1_slack14.1.txz
ca6b49bb17c602e6637edca5686afc10 openssl-solibs-1.0.1k-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages:
b9071e68e60d598a85659df0519131c2 openssl-1.0.1k-x86_64-1_slack14.1.txz
a835c6471b1cf5b162afe0782a6384bc openssl-solibs-1.0.1k-x86_64-1_slack14.1.txz

Slackware -current packages:
cb7d3aa850b3cfe54abd1eb61c881cc7 a/openssl-solibs-1.0.1k-i486-1.txz
00ae9f01693bf86a709fd79b0e8cd099 n/openssl-1.0.1k-i486-1.txz

Slackware x86_64 -current packages:
727887e756148bb1d28fa348804fcdb9 a/openssl-solibs-1.0.1k-x86_64-1.txz
9c254936144f5aaaf8fe4eee033f5658 n/openssl-1.0.1k-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg openssl-1.0.1k-i486-1_slack14.1.txz
openssl-solibs-1.0.1k-i486-1_slack14.1.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlSwFeoACgkQakRjwEAQIjOdQgCeKvQ4MndLHFEUIFOTPTcMQAWD
5NkAn1Gla76ists8zUx0PAHsYN4u2UYZ
=JSP/
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung