[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
(fwd) OpenSSL-0.9.6a has security fixes
[Time to upgrade if you're an OpenSSL (ssh, secure IMAP, etc) user, or
wait until your distribution maker comes up with packages-- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="0IvGJv3f9h+YhkrH"
Content-Disposition: inline
Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mail-Followup-To: BugTraq <bugtraq@xxxxxxxxxxxxxxxxx>
User-Agent: Mutt/1.2.5i
Message-ID: <20010424154007.D9092@xxxxxxxxxxxxxxxxxxxxxx>
Reply-To: Jim Knoble <jmknoble@xxxxxxxxxxx>
Organization: LiquidMeme
From: Jim Knoble <jmknoble@xxxxxxxxxxx>
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject: OpenSSL-0.9.6a has security fixes
Date: Tue, 24 Apr 2001 15:40:07 -0400
--0IvGJv3f9h+YhkrH
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
This doesn't seem to have been announced here: OpenSSL-0.9.6a appears
to have been released somewhat quietly, and also appears to include
several security fixes:
- Security fix: change behavior of OpenSSL to avoid using environment
variables when running as root.
=20
- Security fix: check the result of RSA-CRT to reduce the possibility
of deducing the private key from an incorrectly calculated signature.
=20
- Security fix: prevent Bleichenbacher's DSA attack.=20
=20
- Security fix: Zero the premaster secret after deriving the master
secret in DH ciphersuites.
Also:
We consider OpenSSL 0.9.6a to be the best version of OpenSSL
available and we strongly recommend that users of older versions,
especially of old SSLeay versions, upgrade as soon as possible.
Complete text of the announcement available at:
http://www.openssl.org/news/announce.html
--=20
jim knoble | jmknoble@xxxxxxxxxxx | http://www.jmknoble.cx/
(GnuPG fingerprint: 31C4:8AAC:F24E:A70C:4000::BBF4:289F:EAA8:1381:1491)
--0IvGJv3f9h+YhkrH
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (Linux)
Comment: finger jmknoble@xxxxxxxxx for GnuPG public key
iEYEARECAAYFAjrl1pcACgkQKJ/qqBOBFJEH1ACbBbQ81tGoDFmrKBppuy8+w9+E
lDoAnjqKwG/KsK6Z4uT/V3iNARN2cX68
=tL7t
-----END PGP SIGNATURE-----
--0IvGJv3f9h+YhkrH--
------------------------------
End of this Digest
******************
--
Raju Mathur raju@xxxxxxxxxxxxx http://kandalaya.org/