Lucene search

K
centosCentOS ProjectCESA-2007:1003
HistoryNov 15, 2007 - 3:53 p.m.

openssl security update

2007-11-1515:53:13
CentOS Project
lists.centos.org
50

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.576 Medium

EPSS

Percentile

97.7%

CentOS Errata and Security Advisory CESA-2007:1003

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, and is also a
full-strength general-purpose cryptography library.

A flaw was found in the SSL_get_shared_ciphers() utility function. An
attacker could send a list of ciphers to an application that used this
function and overrun a buffer by a single byte (CVE-2007-5135). Few
applications make use of this vulnerable function and generally it is used
only when applications are compiled for debugging.

A number of possible side-channel attacks were discovered affecting
OpenSSL. A local attacker could possibly obtain RSA private keys being used
on a system. In practice these attacks would be difficult to perform
outside of a lab environment. This update contains backported patches to
mitigate these issues. (CVE-2007-3108)

As well, these updated packages fix the following bugs:

  • multithreaded applications could cause a segmentation fault or deadlock
    when calling the random number generator initialization (RAND_poll) in the
    OpenSSL library, for a large number of threads simultaneously.

  • in certain circumstances, if an application using the OpenSSL library
    reused the SSL session cache for multiple purposes (with various parameters
    of the SSL protocol), the session parameters could be mismatched.

  • a segmentation fault could occur when a corrupted pkcs12 file was being
    loaded using the “openssl pkcs12 -in [pkcs12-file]” command, where
    [pkcs12-file] is the pkcs12 file.

Users of OpenSSL should upgrade to these updated packages, which contain
backported patches to resolve these issues.

Note: After installing this update, users are advised to either restart all
services that use OpenSSL or restart their system.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-November/076584.html
https://lists.centos.org/pipermail/centos-announce/2007-November/076591.html

Affected packages:
openssl
openssl-devel
openssl-perl

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:1003

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.576 Medium

EPSS

Percentile

97.7%