drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in openssl
Name: |
Denial of Service in openssl |
|
ID: |
SSA:2008-210-08 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware 11.0, Slackware 12.0, Slackware 12.1 |
|
Datum: |
Di, 29. Juli 2008, 07:54 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] openssl (SSA:2008-210-08)
New openssl packages are available for Slackware 11.0, 12.0, 12.1, and -current to fix security issues.
More details about this issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
Upgraded OpenSSH packages have been provided to make sure that ssh is not broken my the update -- especially if your machine is a remote one, be SURE to upgrade to the new openssh package as well!
Here are the details from the Slackware 12.1 ChangeLog: +--------------------------+ patches/packages/openssl-0.9.8h-i486-1_slack12.1.tgz: Upgraded to OpenSSL 0.9.8h. The Codenomicon TLS test suite uncovered security bugs in OpenSSL. If OpenSSL was compiled using non-default options (Slackware's package is not), then a malicious packet could cause a crash. Also, a malformed TLS handshake could also lead to a crash. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672 When upgrading OpenSSL, it is VERY IMPORTANT to also upgrade OpenSSH, or it is possible to be unable to log back into sshd! (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated packages for Slackware 11.0: openssl-solibs-0.9.8h-i486-1_slack11.0.tgz openssl-0.9.8h-i486-1_slack11.0.tgz openssh-5.1p1-i486-1_slack11.0.tgz
Updated packages for Slackware 12.0: openssl-solibs-0.9.8h-i486-1_slack12.0.tgz openssl-0.9.8h-i486-1_slack12.0.tgz openssh-5.1p1-i486-1_slack12.0.tgz
Updated packages for Slackware 12.1: openssl-solibs-0.9.8h-i486-1_slack12.1.tgz openssl-0.9.8h-i486-1_slack12.1.tgz openssh-5.1p1-i486-1_slack12.1.tgz
Updated packages for Slackware -current: openssl-solibs-0.9.8h-i486-1.tgz openssl-0.9.8h-i486-1.tgz openssh-5.1p1-i486-1.tgz
MD5 signatures: +-------------+
Slackware 11.0 packages: 8ee9a3b3366a29a84b7314fb40a7c808 openssl-0.9.8h-i486-1_slack11.0.tgz 863b5deeffd7eb58ef41b1b49759bff5 openssl-solibs-0.9.8h-i486-1_slack11.0.tgz 617456c059e8d7761de7e3c92ee5e473 openssh-5.1p1-i486-1_slack11.0.tgz
Slackware 12.0 packages: ae721f8dd900c930d6c2e27581f577a9 openssl-0.9.8h-i486-1_slack12.0.tgz 30271692b6253c5dc733c80a986d13d1 openssl-solibs-0.9.8h-i486-1_slack12.0.tgz 5fd2eae44bf0d311bdfebb930790ab88 openssh-5.1p1-i486-1_slack12.0.tgz
Slackware 12.1 packages: cb3674edf80bfabe23a1901f9eecea09 openssl-0.9.8h-i486-1_slack12.1.tgz dc0df15982723244c920417d5fa9c15a openssl-solibs-0.9.8h-i486-1_slack12.1.tgz 0684a119d56721053e1f57b06692642d openssh-5.1p1-i486-1_slack12.1.tgz
Slackware -current packages: b72f7a417b524f06f8443ea9a13b58ca openssl-0.9.8h-i486-1.tgz fa6658aabc7ab02736a01e511b9cc9ec openssl-solibs-0.9.8h-i486-1.tgz 97d4828d0b5d88b16d83d7265a54f9de openssh-5.1p1-i486-1.tgz
Installation instructions: +------------------------+
Upgrade the packages as root: # upgradepkg openssl-0.9.8h-i486-1_slack12.1.tgz openssl-solibs-0.9.8h-i486-1_slack12.1.tgz openssh-5.1p1-i486-1_slack12.1.tgz
Then, restart sshd if you use it: sh /etc/rc.d/rc.sshd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkiOneoACgkQakRjwEAQIjPX1wCfZwdQKlNgIq4EwORqMsf0xxwx Yv0AniWkViglVZkSO7cIii+7Zs/9/I+d =9HCI -----END PGP SIGNATURE-----
|
|
|
|