lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040317145010.605313C0F3@juggernaut.guardiandigital.com> From: security at guardiandigital.com (EnGarde Secure Linux) Subject: [ESA-20040317-003] 'openssl' Denial of Service vulnerabilities. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 +------------------------------------------------------------------------+ | Guardian Digital Security Advisory March 17, 2004 | | http://www.guardiandigital.com ESA-20040317-003 | | | | Packages: openssl, openssl-misc | | Summary: Denial of Service vulnerabilities. | +------------------------------------------------------------------------+ EnGarde Secure Linux is an enterprise class Linux platform engineered to enable corporations to quickly and cost-effectively build a complete and secure Internet presence while preventing Internet threats. OVERVIEW - -------- Using a commercial TLS protocol testing suite the OpenSSL Project discovered three vulnerabilities in the OpenSSL toolkit. EnGarde Secure Linux is vulnerable to two of these these three Denial of Service (DoS) vulnerabilities. Please refer to the following URL for more details on these issues: http://www.openssl.org/news/secadv_20040317.txt The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0079 and CAN-2004-0081 to these issues. Guardian Digital products affected by this issue include: EnGarde Secure Community v1.0.1 EnGarde Secure Community 2 EnGarde Secure Professional v1.1 EnGarde Secure Professional v1.2 EnGarde Secure Professional v1.5 It is recommended that all users apply this update as soon as possible. SOLUTION - -------- Guardian Digital Secure Network subscribers may automatically update affected systems by accessing their account from within the Guardian Digital WebTool. To modify your GDSN account and contact preferences, please go to: https://www.guardiandigital.com/account/ Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1 packages: SRPMS/openssl-0.9.6-1.0.23.src.rpm MD5 Sum: 3240551fe6a581ca9ada59278cb6b6d6 i386/openssl-0.9.6-1.0.23.i386.rpm MD5 Sum: 047396beffed7637fc7030743af3937f i386/openssl-devel-0.9.6-1.0.23.i386.rpm MD5 Sum: bcfc2554cc58d470c3e666876fe93284 i386/openssl-misc-0.9.6-1.0.23.i386.rpm MD5 Sum: d88b34e7ce4345168e65bc2d887ba0bb i686/openssl-0.9.6-1.0.23.i686.rpm MD5 Sum: 1cf1e62a3c2a97dcca1aabb42502042c i686/openssl-devel-0.9.6-1.0.23.i686.rpm MD5 Sum: 9037d0475046f2686cbe7f3cf98029ca i686/openssl-misc-0.9.6-1.0.23.i686.rpm MD5 Sum: 15ef352df0d2991ae0fa1c17778ec2f2 REFERENCES - ---------- Guardian Digital's public key: http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY OpenSSL's Official Web Site: http://www.openssl.org/ Guardian Digital Advisories: http://infocenter.guardiandigital.com/advisories/ Security Contact: security@...rdiandigital.com - -------------------------------------------------------------------------- Author: Ryan W. Maple <ryan@...rdiandigital.com> Copyright 2004, Guardian Digital, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQFAWGWhHD5cqd57fu0RAujOAJ9JYS8cfBEiewWKcJqcJE7s+3LP1gCggGzS vsIDyPXFZPOle5ZbyCWFRmM= =13kU -----END PGP SIGNATURE----- ------------------------------------------------------------------------ To unsubscribe email engarde-security-request@...ardelinux.org with "unsubscribe" in the subject of the message. Copyright(c) 2003 Guardian Digital, Inc. GuardianDigital.com ------------------------------------------------------------------------
Powered by blists - more mailing lists