[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030318143653.GA9866@trustix.com>
Date: Tue, 18 Mar 2003 15:36:53 +0100
From: tsl@...stix.com (Trustix Secure Linux Advisor)
To: bugtraq@...urityfocus.com
Subject: TSLSA-2003-0010 - openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0010
Package name: openssl
Summary: Secret key recovery
Date: 2003-03-18
Affected versions: TSL 1.01, 1.1, 1.2, 1.5
- --------------------------------------------------------------------------
Package description:
OpenSSL is a C library that provides various crytographic algorithms
and protocols, including DES, RC4, RSA, and SSL.
Problem description:
An attack has been demonstrated against the OpenSSL library which can
allow remote recovery of an RSA secret key. This update package forces
RSA blinding and will prevent this attack.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All TSL updates are available from
<URI:http://www.trustix.net/pub/Trustix/updates/>
<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Get SWUP from:
<URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>
Public testing:
These packages have been available for public testing for some time.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://www.trustix.net/pub/Trustix/testing/>
<URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
Questions?
Check out our mailing lists:
<URI:http://www.trustix.net/support/>
Verification:
This advisory along with all TSL packages are signed with the TSL sign key.
This key is available from:
<URI:http://www.trustix.net/TSL-GPG-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.net/errata/trustix-1.2/> and
<URI:http://www.trustix.net/errata/trustix-1.5/>
or directly at
<URI:http://www.trustix.net/errata/misc/2003/TSL-2003-0010-openssl.asc.txt>
MD5sums of the packages:
- --------------------------------------------------------------------------
6837358b16711b87293cf59bb0b44268 1.1/RPMS/openssl-0.9.6-13tr.i586.rpm
206b30a0e05ff11e6402702681f47695 1.1/RPMS/openssl-devel-0.9.6-13tr.i586.rpm
c3d24ac06f439a7a7cccaddcfade297b 1.1/RPMS/openssl-python-0.9.6-13tr.i586.rpm
b3b626b576956453ad490cb82fe7daea 1.1/RPMS/openssl-support-0.9.6-13tr.i586.rpm
70c26cd5310ae6ed56f140c13c2a850f 1.1/SRPMS/openssl-0.9.6-13tr.src.rpm
556561bb570300087232aeb881d853df 1.2/RPMS/openssl-0.9.6-13tr.i586.rpm
97899369f6bd470eea1a097f4dd49b2b 1.2/RPMS/openssl-devel-0.9.6-13tr.i586.rpm
910e4e2383f7e9cd264d3b2629448133 1.2/RPMS/openssl-python-0.9.6-13tr.i586.rpm
5891b2bf8f3da7a4af1c946059dbf867 1.2/RPMS/openssl-support-0.9.6-13tr.i586.rpm
70c26cd5310ae6ed56f140c13c2a850f 1.2/SRPMS/openssl-0.9.6-13tr.src.rpm
c2aad9ca4af09b6ddd5301c590961b5e 1.5/RPMS/openssl-0.9.6-13tr.i586.rpm
e8b83760edde274732c02f86b5a75a08 1.5/RPMS/openssl-devel-0.9.6-13tr.i586.rpm
a4ea4a209355183d12abca85d0855416 1.5/RPMS/openssl-python-0.9.6-13tr.i586.rpm
09e8f98ac9a507fd8733cd30b780b1fb 1.5/RPMS/openssl-support-0.9.6-13tr.i586.rpm
70c26cd5310ae6ed56f140c13c2a850f 1.5/SRPMS/openssl-0.9.6-13tr.src.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE+dyniwRTcg4BxxS0RAqQJAJwPN9ywG+1kEpVzBgsiFiOQt1rhZACdHTpW
dw/9Y/Kkg2jPzyAIxcYcRy4=
=zcYt
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists