TSLSA-2001-0012 - OpenSSL

From: Trustix Secure Linux Advisor (tslat_private)
Date: Wed Jul 11 2001 - 05:41:41 PDT

  • Next message: Cisco Systems Product Security Incident Response Team: "Cisco Security Advisory: Vulnerabilities in Cisco SN 5420 Storage Routers"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    Trustix Secure Linux Security Advisory #2001-0012
    
    Package name:      OpenSSL
    Date:              2001-07-11
    Affected versions: TSL 1.01, 1.1, 1.2
    
     --------------------------------------------------------------------------
    
    Problem description:
      From the OpenSSL Advisory:
        The pseudo-random number generator (PRNG) in SSLeay/OpenSSL versions
        up to 0.9.6a is weakened by a design error.  Knowing the output of
        specific PRNG requests (including a number of consecutive very short
        PRNG requests) would allow an attacker to determine the PRNG's
        internal state and thus to predict future PRNG output.
    
    Action:
      We recommend that all systems with this package installed are upgraded.
    
    
    Location:
      All TSL updates are available from
      <URI:http://www.trustix.net/pub/Trustix/updates/>
      <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>
    
    
    Automatic updates:
      Users of the SWUP tool, can enjoy having updates automatically
      installed using 'swup --upgrade'.
      Note that kernel packages are not normally fit to be upgraded this way
      and therefore excluded in the default configuration.
    
      Get SWUP from:
      <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>
    
    
    Questions?
      Check out our mailing lists:
      <URI:http://www.trustix.net/support/>
    
    
    Verification:
      This advisory along with all TSL packages are signed with the TSL sign key.
      This key available from:
      <URI:http://www.trustix.net/TSL-GPG-KEY>
    
      The advisory itself is available from the errata page at
      <URI:http://www.trustix.net/errata/trustix-1.2/>
      or directly at
      <URI:http://www.trustix.net/errata/misc/2001/TSL-2001-0012-openssl.asc.txt>
    
    MD5sums of the packages:
    - --------------------------------------------------------------------------
    caa5dc40088b00e9a77c4721939783b1  ./1.2/SRPMS/openssl-0.9.6-2tr.src.rpm
    e2c6604fc4013abea33c23b6b9a7cbad  ./1.2/RPMS/openssl-devel-0.9.6-2tr.i586.rpm
    0a64aca805351c89eb87eb992c0005d1  ./1.2/RPMS/openssl-0.9.6-2tr.i586.rpm
    6849562cfee9afa4d22ef6f599292fc3  ./1.1/SRPMS/openssl-0.9.5a-2tr.src.rpm
    ec88b361720e40d6507b472ab397490a  ./1.1/RPMS/openssl-devel-0.9.5a-2tr.i586.rpm
    605b5b006f4b0c6d3894ee50fbffbb33  ./1.1/RPMS/openssl-0.9.5a-2tr.i586.rpm
    - --------------------------------------------------------------------------
    
    
    Trustix Security Team
     
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE7TEP/wRTcg4BxxS0RAkDpAJ9XkFFnuGMH5Uo7T5vRf28jfO9P/wCfY8ht
    Ito0WvjDq9LZLxXK+SqVoeo=
    =DPdB
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Jul 11 2001 - 08:06:33 PDT