drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenSSL
Name: |
Mehrere Probleme in OpenSSL |
|
ID: |
201702-07 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Di, 14. Februar 2017, 14:30 |
|
Referenzen: |
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --nVCV289IJoCj3oauQ6PHkFxGXMIwhhnWj Content-Type: multipart/mixed; boundary="6TxcaqolfH5V8d0tqHGgGlj1v2tmUA9I9"; protected-headers="v1" From: Thomas Deutschmann <whissi@gentoo.org> Reply-To: security@gentoo.org To: gentoo-announce@lists.gentoo.org Message-ID: <fafef865-9215-0d36-2b73-b9401c57dec2@gentoo.org> Subject: [ GLSA 201702-07 ] OpenSSL: Multiple vulnerabilities
--6TxcaqolfH5V8d0tqHGgGlj1v2tmUA9I9 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201702-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: February 14, 2017 Bugs: #607318 ID: 201702-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in OpenSSL, the worst of which might allow attackers to access sensitive information.
Background ==========
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/openssl < 1.0.2k >= 1.0.2k
Description ===========
Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.
Impact ======
A remote attacker is able to crash applications linked against OpenSSL or could obtain sensitive private-key information via an attack against the Diffie-Hellman (DH) ciphersuite.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2k"
References ==========
[ 1 ] CVE-2016-7055 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055 [ 2 ] CVE-2017-3730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730 [ 3 ] CVE-2017-3731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731 [ 4 ] CVE-2017-3732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201702-07
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--6TxcaqolfH5V8d0tqHGgGlj1v2tmUA9I9--
--nVCV289IJoCj3oauQ6PHkFxGXMIwhhnWj Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0
iQJ8BAEBCgBmBQJYovqYXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzM0M1ODQ4MkM0MDIyOTJEMkUzQzVDMDY5 NzA5RjkwQzNDOTZGRkM4AAoJEJcJ+Qw8lv/I4KIQAJUFQNWpdm6vsi7XWQ55AvNd +RNApONL6Qlt4Xv09zkop5G2Zsz6oOXNf35zCckgPBpC9g75o/OTHRBfvN4To9n6 XvGU7ZndDYMX5hUhI27TkmKioXt/f2vOjMU454cYFLj/sExv5SEFQWkDYrBe4JK/ gZZDqSTN2ydZQxuscjV8YaJy3VidgOfO/ToRqkSNPT6fwbVnTGmUjsEgKmv0rnk9 pv4v81k1mX65jwpWAJwEuJfN8s0gmb9OqW+zb+GWmvO5zbi+ZFBUysNo+1rUQZiz mvxm2dGo+KiiBsYegJ4TiXz1PBp0wS6OFA4XcLmRMiIcRO3TqfQ5xWf4vpfQkt0B JVpaV9UtSL37NCxLLjhNB7LgYBXAcnUZdx3pEZ4oxc5dXB0RW15JPoHDXkL0yZXl kfSzM9nECak5ai0+C01k9YV3JdJqZHqyetQetWgLE0xGhaXVGoVBGav7qWuVO4vX SnHxUf2S1lV37mxAx+SRmhlVeWY+axOkFJzB9nMQByka6mNMAK1mM9sAiSBbP06R 0ZJwmVM9v8NKBAQFUnLEipgLSiDDaMTnr6Nbg5qX392iSwS/jgI5ROR1ym0H2Jug Z82UsBPt1mG5f3qkJWDrS+kghF/6uDsfyqFLrKXSloTBz4lgBzEQaQvvilwdEiaB VtymCj50MlT+YODUDVLw =L67/ -----END PGP SIGNATURE-----
--nVCV289IJoCj3oauQ6PHkFxGXMIwhhnWj--
|
|
|
|