Lucene search

K
redhatRedHatRHSA-2007:1003
HistoryNov 15, 2007 - 12:00 a.m.

(RHSA-2007:1003) Moderate: openssl security and bug fix update

2007-11-1500:00:00
access.redhat.com
19

0.58 Medium

EPSS

Percentile

97.7%

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, and is also a
full-strength general-purpose cryptography library.

A flaw was found in the SSL_get_shared_ciphers() utility function. An
attacker could send a list of ciphers to an application that used this
function and overrun a buffer by a single byte (CVE-2007-5135). Few
applications make use of this vulnerable function and generally it is used
only when applications are compiled for debugging.

A number of possible side-channel attacks were discovered affecting
OpenSSL. A local attacker could possibly obtain RSA private keys being used
on a system. In practice these attacks would be difficult to perform
outside of a lab environment. This update contains backported patches to
mitigate these issues. (CVE-2007-3108)

As well, these updated packages fix the following bugs:

  • multithreaded applications could cause a segmentation fault or deadlock
    when calling the random number generator initialization (RAND_poll) in the
    OpenSSL library, for a large number of threads simultaneously.

  • in certain circumstances, if an application using the OpenSSL library
    reused the SSL session cache for multiple purposes (with various parameters
    of the SSL protocol), the session parameters could be mismatched.

  • a segmentation fault could occur when a corrupted pkcs12 file was being
    loaded using the “openssl pkcs12 -in [pkcs12-file]” command, where
    [pkcs12-file] is the pkcs12 file.

Users of OpenSSL should upgrade to these updated packages, which contain
backported patches to resolve these issues.

Note: After installing this update, users are advised to either restart all
services that use OpenSSL or restart their system.