TITLE: Ubuntu update for openssl SECUNIA ADVISORY ID: SA17189 VERIFY ADVISORY: http://secunia.com/advisories/17189/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 4.10 http://secunia.com/product/4491/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ DESCRIPTION: Ubuntu has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. For more information: SA17151 SOLUTION: Apply updated packages. -- Ubuntu 4.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d-3ubuntu0.3.diff.gz Size/MD5: 26336 8c653140c8bb55141682f61b2c7ee0c4 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d-3ubuntu0.3.dsc Size/MD5: 636 814be379aed42cf28e5e1714eacb5dea http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d.orig.tar.gz Size/MD5: 2799796 533b7f758325d74c1e01e67994e3ae59 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7d-3ubuntu0.3_amd64.deb Size/MD5: 2676878 d46f388edf90aac95110357c4c7fb41e http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7d-3ubuntu0.3_amd64.deb Size/MD5: 697176 dfb423bccdf95e0251566c86747519ba http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d-3ubuntu0.3_amd64.deb Size/MD5: 900108 5c62807221f03ec34aafe8753362d1dc i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7d-3ubuntu0.3_i386.deb Size/MD5: 2477644 9a6282952a58a0d963ea12dd80626305 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7d-3ubuntu0.3_i386.deb Size/MD5: 2153208 e49463b1a3ae79e586ebf522ed5d5ac1 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d-3ubuntu0.3_i386.deb Size/MD5: 898780 ab5e0af7e6687f1ed7ad943c2a7edc00 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7d-3ubuntu0.3_powerpc.deb Size/MD5: 2759254 aa0ad1ec7ccdcab984c33f34ae04013d http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7d-3ubuntu0.3_powerpc.deb Size/MD5: 700982 d6bdb5e4c7b427278a5f6dd7115047e4 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7d-3ubuntu0.3_powerpc.deb Size/MD5: 904618 18578a43604449f15794852b32c55c9a -- Ubuntu 5.04 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.2.diff.gz Size/MD5: 28853 653177acb3126d83a75863fef01f7618 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.2.dsc Size/MD5: 645 71ab340d8a9c5e09398fc5cae8b8f3a5 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e.orig.tar.gz Size/MD5: 3043231 a8777164bca38d84e5eb2b1535223474 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.2_amd64.udeb Size/MD5: 495074 4aee5a5c1ea16cb37e4bd787daa17bb6 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.2_amd64.deb Size/MD5: 2693172 30ced54e4bddae466cc8a636729d4bf6 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.2_amd64.deb Size/MD5: 769494 bb2132ccc55fe686417fa58fe79366d5 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.2_amd64.deb Size/MD5: 903540 c38ed2ab04260cc37c861b4714a292e6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.2_i386.udeb Size/MD5: 433190 a1d3b3d83038c4867c3bbed914a7799c http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.2_i386.deb Size/MD5: 2492448 1c299b25caad322de3bbff442980d4fe http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.2_i386.deb Size/MD5: 2240404 fc002998c376102f4afef943e42921d7 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.2_i386.deb Size/MD5: 900980 d7d18142b2f888fb39c68a535e1797a5 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7e-3ubuntu0.2_powerpc.udeb Size/MD5: 499312 344fa2d38577e134300a6c66b7501ad5 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.7e-3ubuntu0.2_powerpc.deb Size/MD5: 2774020 fa61cfb6691efb466d410868bcf70b33 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.7_0.9.7e-3ubuntu0.2_powerpc.deb Size/MD5: 779142 8591771370630d0947159f20c66a7844 http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.7e-3ubuntu0.2_powerpc.deb Size/MD5: 908034 467656d782df126e20d87f28885481f7 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-204-1 OTHER REFERENCES: SA17151: http://secunia.com/advisories/17151/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------