Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in OpenSSL
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in OpenSSL
ID: RHSA-2016:1137-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Di, 31. Mai 2016, 10:40
Referenzen: https://access.redhat.com/security/cve/CVE-2016-2108

Originalnachricht

=====================================================================
Red Hat Security Advisory

Synopsis: Important: openssl security update
Advisory ID: RHSA-2016:1137-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2016:1137
Issue date: 2016-05-31
CVE Names: CVE-2016-2108
=====================================================================

1. Summary:

An update for openssl is now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64

3. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols, as well as a full-strength
general-purpose cryptography library.

Security Fix(es):

* A flaw was found in the way OpenSSL encoded certain ASN.1 data
structures. An attacker could use this flaw to create a specially crafted
certificate which, when verified or re-encoded by OpenSSL, could cause it
to crash, or execute arbitrary code using the permissions of the user
running an application compiled against the OpenSSL library.
(CVE-2016-2108)

Red Hat would like to thank the OpenSSL project for reporting this issue.
Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David
Benjamin (Google) as the original reporters.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library
must be restarted, or the system rebooted.

5. Bugs fixed (https://bugzilla.redhat.com/):

1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
openssl-0.9.8e-40.el5_11.src.rpm

i386:
openssl-0.9.8e-40.el5_11.i386.rpm
openssl-0.9.8e-40.el5_11.i686.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i386.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i686.rpm
openssl-perl-0.9.8e-40.el5_11.i386.rpm

x86_64:
openssl-0.9.8e-40.el5_11.i686.rpm
openssl-0.9.8e-40.el5_11.x86_64.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i686.rpm
openssl-debuginfo-0.9.8e-40.el5_11.x86_64.rpm
openssl-perl-0.9.8e-40.el5_11.x86_64.rpm

Red Hat Enterprise Linux Desktop Workstation (v. 5 client):

Source:
openssl-0.9.8e-40.el5_11.src.rpm

i386:
openssl-debuginfo-0.9.8e-40.el5_11.i386.rpm
openssl-devel-0.9.8e-40.el5_11.i386.rpm

x86_64:
openssl-debuginfo-0.9.8e-40.el5_11.i386.rpm
openssl-debuginfo-0.9.8e-40.el5_11.x86_64.rpm
openssl-devel-0.9.8e-40.el5_11.i386.rpm
openssl-devel-0.9.8e-40.el5_11.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
openssl-0.9.8e-40.el5_11.src.rpm

i386:
openssl-0.9.8e-40.el5_11.i386.rpm
openssl-0.9.8e-40.el5_11.i686.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i386.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i686.rpm
openssl-devel-0.9.8e-40.el5_11.i386.rpm
openssl-perl-0.9.8e-40.el5_11.i386.rpm

ia64:
openssl-0.9.8e-40.el5_11.i686.rpm
openssl-0.9.8e-40.el5_11.ia64.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i686.rpm
openssl-debuginfo-0.9.8e-40.el5_11.ia64.rpm
openssl-devel-0.9.8e-40.el5_11.ia64.rpm
openssl-perl-0.9.8e-40.el5_11.ia64.rpm

ppc:
openssl-0.9.8e-40.el5_11.ppc.rpm
openssl-0.9.8e-40.el5_11.ppc64.rpm
openssl-debuginfo-0.9.8e-40.el5_11.ppc.rpm
openssl-debuginfo-0.9.8e-40.el5_11.ppc64.rpm
openssl-devel-0.9.8e-40.el5_11.ppc.rpm
openssl-devel-0.9.8e-40.el5_11.ppc64.rpm
openssl-perl-0.9.8e-40.el5_11.ppc.rpm

s390x:
openssl-0.9.8e-40.el5_11.s390.rpm
openssl-0.9.8e-40.el5_11.s390x.rpm
openssl-debuginfo-0.9.8e-40.el5_11.s390.rpm
openssl-debuginfo-0.9.8e-40.el5_11.s390x.rpm
openssl-devel-0.9.8e-40.el5_11.s390.rpm
openssl-devel-0.9.8e-40.el5_11.s390x.rpm
openssl-perl-0.9.8e-40.el5_11.s390x.rpm

x86_64:
openssl-0.9.8e-40.el5_11.i686.rpm
openssl-0.9.8e-40.el5_11.x86_64.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i386.rpm
openssl-debuginfo-0.9.8e-40.el5_11.i686.rpm
openssl-debuginfo-0.9.8e-40.el5_11.x86_64.rpm
openssl-devel-0.9.8e-40.el5_11.i386.rpm
openssl-devel-0.9.8e-40.el5_11.x86_64.rpm
openssl-perl-0.9.8e-40.el5_11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-2108
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXTS0/XlSAg2UNWIIRAtIxAKCSiiYIucEkdc4w9pNSn/lnvi+UeACcCpON
+u2gKnPG1WRg1N8sodue5yU=
=UQzD
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung