TITLE: Fedora update for openssl/openssl096b/openssl097a SECUNIA ADVISORY ID: SA17210 VERIFY ADVISORY: http://secunia.com/advisories/17210/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued updates for openssl/openssl096b/openssl097a. These fix a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. For more information: SA17151 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ openssl096b users: a81510ddd8127092def521888a29735c SRPMS/openssl096b-0.9.6b-21.2.src.rpm a16e20e80018c7676260339fd9d5dec1 x86_64/openssl096b-0.9.6b-21.2.x86_64.rpm fa00e72e190651d0c6c28bb197c15661 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.2.x86_64.rpm 515e5aa803873859c235d0822ab74710 x86_64/openssl096b-0.9.6b-21.2.i386.rpm 515e5aa803873859c235d0822ab74710 i386/openssl096b-0.9.6b-21.2.i386.rpm d892c00a0272ede0a0f625f5ae746313 i386/debug/openssl096b-debuginfo-0.9.6b-21.2.i386.rpm openssl users: 385070cd4cbcef6beb59571066a08baf SRPMS/openssl-0.9.7a-42.2.src.rpm dd28b6aba5377c64da20c05e2c60722e x86_64/openssl-0.9.7a-42.2.x86_64.rpm 062d09908f7777387958b35c71112215 x86_64/openssl-devel-0.9.7a-42.2.x86_64.rpm cf47c8a41605ee78213f0ed54b81d01c x86_64/openssl-perl-0.9.7a-42.2.x86_64.rpm 7dd0586966ce231751013a66050c1cd1 x86_64/debug/openssl-debuginfo-0.9.7a-42.2.x86_64.rpm 5771664b0590b304c5d2a06dba276642 x86_64/openssl-0.9.7a-42.2.i386.rpm 797ddd44ea165b234463a80107f14f18 x86_64/openssl-0.9.7a-42.2.i686.rpm 5771664b0590b304c5d2a06dba276642 i386/openssl-0.9.7a-42.2.i386.rpm 26a292002e9806eb6331ade376c04c68 i386/openssl-devel-0.9.7a-42.2.i386.rpm 1c2676b06b305fcc3e82b79a641cdbb7 i386/openssl-perl-0.9.7a-42.2.i386.rpm a8599ed6c62d679dc4f5aa4bd0b63131 i386/debug/openssl-debuginfo-0.9.7a-42.2.i386.rpm 797ddd44ea165b234463a80107f14f18 i386/openssl-0.9.7a-42.2.i686.rpm ac7dd0ec8c3e1d57b580ceffce7f37bb i386/debug/openssl-debuginfo-0.9.7a-42.2.i686.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ openssl097a users: 7b5d366a2175f506df5470052584f931 SRPMS/openssl097a-0.9.7a-3.1.src.rpm af1d476f7115ee75d213daa91bb42808 ppc/openssl097a-0.9.7a-3.1.ppc.rpm 2b51057a778da0e5cd3ce961499fd4e7 ppc/debug/openssl097a-debuginfo-0.9.7a-3.1.ppc.rpm aeaeb2f3d8bc9f2a58a54c7fdead02f8 x86_64/openssl097a-0.9.7a-3.1.x86_64.rpm 5bb4865bf5b279349115cd4327939d8c x86_64/debug/openssl097a-debuginfo-0.9.7a-3.1.x86_64.rpm 89142415f683cf15a74b1b6cf8fcaeda i386/openssl097a-0.9.7a-3.1.i386.rpm 6d9052a438a4e279baf5e3e633502fe0 i386/debug/openssl097a-debuginfo-0.9.7a-3.1.i386.rpm openssl users: 7a208caac25c849bea298129a50cd07b SRPMS/openssl-0.9.7f-7.10.src.rpm 59019192fd5257073275df66aba0ed9c ppc/openssl-0.9.7f-7.10.ppc.rpm 3efb44c6fa9b7ede9d6bf6ede9aabd16 ppc/openssl-devel-0.9.7f-7.10.ppc.rpm 78e9dc41a9f7da959c79a6b47b364e7c ppc/openssl-perl-0.9.7f-7.10.ppc.rpm dfd846c61dba5ade1414c5cc40d08014 ppc/debug/openssl-debuginfo-0.9.7f-7.10.ppc.rpm 28be950fca37f2778cb68e18572f3e13 ppc/openssl-0.9.7f-7.10.ppc64.rpm 97ffac074c3e0efc99110726eb6cf3cf x86_64/openssl-0.9.7f-7.10.x86_64.rpm f7e8e31bfac9e30124850913244b9c1a x86_64/openssl-devel-0.9.7f-7.10.x86_64.rpm 7e6528df16fb831ba79e6faeeea5125a x86_64/openssl-perl-0.9.7f-7.10.x86_64.rpm d421465583f86241aebd04dc9616fc6e x86_64/debug/openssl-debuginfo-0.9.7f-7.10.x86_64.rpm 10b0af84502fa18f9894e9e759cecd64 i386/openssl-0.9.7f-7.10.i386.rpm b68877aac95d2066a8880495d96b6105 i386/openssl-devel-0.9.7f-7.10.i386.rpm 752088e010d088efcb8a8d433e7e2814 i386/openssl-perl-0.9.7f-7.10.i386.rpm aac366e42a46f27c7136e6c4dc602278 i386/debug/openssl-debuginfo-0.9.7f-7.10.i386.rpm 4af1e37b0caba144bd44df07af5f33fb i386/openssl-0.9.7f-7.10.i686.rpm 38e486decdc14d578975079e573202de i386/debug/openssl-debuginfo-0.9.7f-7.10.i686.rpm OTHER REFERENCES: SA17151: http://secunia.com/advisories/17151/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------