Skip to navigation

Security Advisory Important: openssl security update

Advisory: RHSA-2010:0162-1
Type: Security Advisory
Severity: Important
Issued on: 2010-03-25
Last updated on: 2010-03-25
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
CVEs (cve.mitre.org): CVE-2009-3245
CVE-2009-3555
CVE-2010-0433

Details

Updated openssl packages that fix several security issues are now available
for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

It was discovered that OpenSSL did not always check the return value of the
bn_wexpand() function. An attacker able to trigger a memory allocation
failure in that function could cause an application using the OpenSSL
library to crash or, possibly, execute arbitrary code. (CVE-2009-3245)

A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure
Sockets Layer) protocols handled session renegotiation. A man-in-the-middle
attacker could use this flaw to prefix arbitrary plain text to a client's
session (for example, an HTTPS connection to a website). This could force
the server to process an attacker's request as if authenticated using the
victim's credentials. This update addresses this flaw by implementing the
TLS Renegotiation Indication Extension, as defined in RFC 5746.
(CVE-2009-3555)

Refer to the following Knowledgebase article for additional details about
the CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491

A missing return value check flaw was discovered in OpenSSL, that could
possibly cause OpenSSL to call a Kerberos library function with invalid
arguments, resulting in a NULL pointer dereference crash in the MIT
Kerberos library. In certain configurations, a remote attacker could use
this flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos
cipher suites during the TLS handshake. (CVE-2010-0433)

All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
openssl-0.9.8e-12.el5_4.6.src.rpm
File outdated by:  RHEA-2014:0104
    MD5: 08a8c424d46353fc1203ce08c2d07a32
SHA-256: c2f16cac1d11585e03e2812e334614403ab73d33cbd14aa0b19f3c7f234d59f7
 
IA-32:
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
 
x86_64:
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
openssl-devel-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: ed5f54b8093827c435b27183df17e332
SHA-256: f3d9c4da8d7005a638dea4f3bff1ee3a07814b15fee6f7e1f9f749e6ad10dad1
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openssl-0.9.8e-12.el5_4.6.src.rpm
File outdated by:  RHEA-2014:0104
    MD5: 08a8c424d46353fc1203ce08c2d07a32
SHA-256: c2f16cac1d11585e03e2812e334614403ab73d33cbd14aa0b19f3c7f234d59f7
 
IA-32:
openssl-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: 5ef69ca4b451b1f10e24d8447f7f2e16
SHA-256: 161e1d5f034f0b25c01fc989100e5ef15d3dbf42a75d985da33e34568f905675
openssl-0.9.8e-12.el5_4.6.i686.rpm
File outdated by:  RHEA-2014:0104
    MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
openssl-perl-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: c9f50de95c44f005703e2324ecca0c0d
SHA-256: 5e9fe1e896ab8a0b0aa020d2a3663b1637d1f2a3dfc3efae6b3dd165df4da318
 
IA-64:
openssl-0.9.8e-12.el5_4.6.i686.rpm
File outdated by:  RHEA-2014:0104
    MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-0.9.8e-12.el5_4.6.ia64.rpm
File outdated by:  RHEA-2014:0104
    MD5: b6c0b98fae5cd99612455a9a6fcf2fa2
SHA-256: 36e5895b050e49568008393357fd41a5a5365d59cf7db967e5e8dd42620d693a
openssl-devel-0.9.8e-12.el5_4.6.ia64.rpm
File outdated by:  RHEA-2014:0104
    MD5: a39ca13fd7cb2f50b7e05ed80ba9b8de
SHA-256: 13b684940d987882ae189593ab8d6333f552d6e7bfaa2c45ff8f66f65c186d39
openssl-perl-0.9.8e-12.el5_4.6.ia64.rpm
File outdated by:  RHEA-2014:0104
    MD5: e21bf9b06eb0aa9510ea9149a1f577db
SHA-256: a45bbac88c02287783dca488c8355f475a888f7d11a9edaba640508635c126b0
 
PPC:
openssl-0.9.8e-12.el5_4.6.ppc.rpm
File outdated by:  RHEA-2014:0104
    MD5: 7a9d481b6eebc6127a8c36975ecf40ae
SHA-256: 1f5ac7edc646297461725d56b347c3085550c3411709f5df2ffb4dc1a19906cc
openssl-0.9.8e-12.el5_4.6.ppc64.rpm
File outdated by:  RHEA-2014:0104
    MD5: 45489ec88a64bdddb0c589465efb1c29
SHA-256: 26bc5657709ace5d904ca3a09be57e467d574047c8fd1d0be60f59731dc33b07
openssl-devel-0.9.8e-12.el5_4.6.ppc.rpm
File outdated by:  RHEA-2014:0104
    MD5: 26e01fcfc63c64a8aa932685d82a87d1
SHA-256: a1e6baa97b0e8863e1b135c574c17e351b380d956a767a8d3df45cc34d0e56d4
openssl-devel-0.9.8e-12.el5_4.6.ppc64.rpm
File outdated by:  RHEA-2014:0104
    MD5: a310dfc3f3d5e53fa483cd30acc61464
SHA-256: 9d436133b45e9fc57b3e773c124569958f27fe88e699cf2a6610082cb774900c
openssl-perl-0.9.8e-12.el5_4.6.ppc.rpm
File outdated by:  RHEA-2014:0104
    MD5: d48f174fafc5137821fc9981b7895d43
SHA-256: 35d460ef16bcf558409aad122d1f5f671506f4e90c27485ce0bbc882c42005f4
 
s390x:
openssl-0.9.8e-12.el5_4.6.s390.rpm
File outdated by:  RHEA-2014:0104
    MD5: e2f644589e72aee95360afb4be532553
SHA-256: f26d42be2e78404a3e2475ac606985e264a4bcc998f6354a0c8c7acbfd0bdd83
openssl-0.9.8e-12.el5_4.6.s390x.rpm
File outdated by:  RHEA-2014:0104
    MD5: d6566519fd0744c688951b28ac615f9a
SHA-256: c69af24f77130cc45faea5b71f71e0fcf954dcb58c794a074cd3ceb70fbdf8bc
openssl-devel-0.9.8e-12.el5_4.6.s390.rpm
File outdated by:  RHEA-2014:0104
    MD5: b5947f43e54534326cfc91687dec4d92
SHA-256: a01e56939910163b9b426a3753824cc71e85cf58145339a250afc5d39e576c97
openssl-devel-0.9.8e-12.el5_4.6.s390x.rpm
File outdated by:  RHEA-2014:0104
    MD5: f69af4ef61ddde3ebb64463a5484a0fb
SHA-256: ee70a76bba279ac7ba67f1ddecf02137fce680eba03273aa7824dd650d6a77ff
openssl-perl-0.9.8e-12.el5_4.6.s390x.rpm
File outdated by:  RHEA-2014:0104
    MD5: 6cfa765e98eddd7fed8212f0b8e4054a
SHA-256: 97050f1141f072776cb67fda5bedee0d27b28f0397ae8494b39e6af848830421
 
x86_64:
openssl-0.9.8e-12.el5_4.6.i686.rpm
File outdated by:  RHEA-2014:0104
    MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: 4811fd51dbdb93ab92b8ae295bb3e9a9
SHA-256: ad3db9472dfabfe86002baae6edb3750cdfad7f9d31133170e17622f7f53f50a
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
openssl-devel-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: ed5f54b8093827c435b27183df17e332
SHA-256: f3d9c4da8d7005a638dea4f3bff1ee3a07814b15fee6f7e1f9f749e6ad10dad1
openssl-perl-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: d92d7e8cfb95bf56853f1cfe5f25fdf2
SHA-256: a7eb3a4c22f9ad5b5c04bcf38c39947350d8e550a1b6fc6512cded2ab73f8021
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openssl-0.9.8e-12.el5_4.6.src.rpm
File outdated by:  RHEA-2014:0104
    MD5: 08a8c424d46353fc1203ce08c2d07a32
SHA-256: c2f16cac1d11585e03e2812e334614403ab73d33cbd14aa0b19f3c7f234d59f7
 
IA-32:
openssl-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: 5ef69ca4b451b1f10e24d8447f7f2e16
SHA-256: 161e1d5f034f0b25c01fc989100e5ef15d3dbf42a75d985da33e34568f905675
openssl-0.9.8e-12.el5_4.6.i686.rpm
File outdated by:  RHEA-2014:0104
    MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-perl-0.9.8e-12.el5_4.6.i386.rpm
File outdated by:  RHEA-2014:0104
    MD5: c9f50de95c44f005703e2324ecca0c0d
SHA-256: 5e9fe1e896ab8a0b0aa020d2a3663b1637d1f2a3dfc3efae6b3dd165df4da318
 
x86_64:
openssl-0.9.8e-12.el5_4.6.i686.rpm
File outdated by:  RHEA-2014:0104
    MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: 4811fd51dbdb93ab92b8ae295bb3e9a9
SHA-256: ad3db9472dfabfe86002baae6edb3750cdfad7f9d31133170e17622f7f53f50a
openssl-perl-0.9.8e-12.el5_4.6.x86_64.rpm
File outdated by:  RHEA-2014:0104
    MD5: d92d7e8cfb95bf56853f1cfe5f25fdf2
SHA-256: a7eb3a4c22f9ad5b5c04bcf38c39947350d8e550a1b6fc6512cded2ab73f8021
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
openssl-0.9.8e-12.el5_4.6.src.rpm
File outdated by:  RHEA-2014:0104
    MD5: 08a8c424d46353fc1203ce08c2d07a32
SHA-256: c2f16cac1d11585e03e2812e334614403ab73d33cbd14aa0b19f3c7f234d59f7
 
IA-32:
openssl-0.9.8e-12.el5_4.6.i386.rpm     MD5: 5ef69ca4b451b1f10e24d8447f7f2e16
SHA-256: 161e1d5f034f0b25c01fc989100e5ef15d3dbf42a75d985da33e34568f905675
openssl-0.9.8e-12.el5_4.6.i686.rpm     MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm     MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
openssl-perl-0.9.8e-12.el5_4.6.i386.rpm     MD5: c9f50de95c44f005703e2324ecca0c0d
SHA-256: 5e9fe1e896ab8a0b0aa020d2a3663b1637d1f2a3dfc3efae6b3dd165df4da318
 
IA-64:
openssl-0.9.8e-12.el5_4.6.i686.rpm     MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-0.9.8e-12.el5_4.6.ia64.rpm     MD5: b6c0b98fae5cd99612455a9a6fcf2fa2
SHA-256: 36e5895b050e49568008393357fd41a5a5365d59cf7db967e5e8dd42620d693a
openssl-devel-0.9.8e-12.el5_4.6.ia64.rpm     MD5: a39ca13fd7cb2f50b7e05ed80ba9b8de
SHA-256: 13b684940d987882ae189593ab8d6333f552d6e7bfaa2c45ff8f66f65c186d39
openssl-perl-0.9.8e-12.el5_4.6.ia64.rpm     MD5: e21bf9b06eb0aa9510ea9149a1f577db
SHA-256: a45bbac88c02287783dca488c8355f475a888f7d11a9edaba640508635c126b0
 
PPC:
openssl-0.9.8e-12.el5_4.6.ppc.rpm     MD5: 7a9d481b6eebc6127a8c36975ecf40ae
SHA-256: 1f5ac7edc646297461725d56b347c3085550c3411709f5df2ffb4dc1a19906cc
openssl-0.9.8e-12.el5_4.6.ppc64.rpm     MD5: 45489ec88a64bdddb0c589465efb1c29
SHA-256: 26bc5657709ace5d904ca3a09be57e467d574047c8fd1d0be60f59731dc33b07
openssl-devel-0.9.8e-12.el5_4.6.ppc.rpm     MD5: 26e01fcfc63c64a8aa932685d82a87d1
SHA-256: a1e6baa97b0e8863e1b135c574c17e351b380d956a767a8d3df45cc34d0e56d4
openssl-devel-0.9.8e-12.el5_4.6.ppc64.rpm     MD5: a310dfc3f3d5e53fa483cd30acc61464
SHA-256: 9d436133b45e9fc57b3e773c124569958f27fe88e699cf2a6610082cb774900c
openssl-perl-0.9.8e-12.el5_4.6.ppc.rpm     MD5: d48f174fafc5137821fc9981b7895d43
SHA-256: 35d460ef16bcf558409aad122d1f5f671506f4e90c27485ce0bbc882c42005f4
 
s390x:
openssl-0.9.8e-12.el5_4.6.s390.rpm     MD5: e2f644589e72aee95360afb4be532553
SHA-256: f26d42be2e78404a3e2475ac606985e264a4bcc998f6354a0c8c7acbfd0bdd83
openssl-0.9.8e-12.el5_4.6.s390x.rpm     MD5: d6566519fd0744c688951b28ac615f9a
SHA-256: c69af24f77130cc45faea5b71f71e0fcf954dcb58c794a074cd3ceb70fbdf8bc
openssl-devel-0.9.8e-12.el5_4.6.s390.rpm     MD5: b5947f43e54534326cfc91687dec4d92
SHA-256: a01e56939910163b9b426a3753824cc71e85cf58145339a250afc5d39e576c97
openssl-devel-0.9.8e-12.el5_4.6.s390x.rpm     MD5: f69af4ef61ddde3ebb64463a5484a0fb
SHA-256: ee70a76bba279ac7ba67f1ddecf02137fce680eba03273aa7824dd650d6a77ff
openssl-perl-0.9.8e-12.el5_4.6.s390x.rpm     MD5: 6cfa765e98eddd7fed8212f0b8e4054a
SHA-256: 97050f1141f072776cb67fda5bedee0d27b28f0397ae8494b39e6af848830421
 
x86_64:
openssl-0.9.8e-12.el5_4.6.i686.rpm     MD5: 895003f76eaf211e8c5b1e1b82cdcb4b
SHA-256: 6bc3da74d995a1e697f087bcbc87ef6621165478f1c82820eb39be56b00a46c9
openssl-0.9.8e-12.el5_4.6.x86_64.rpm     MD5: 4811fd51dbdb93ab92b8ae295bb3e9a9
SHA-256: ad3db9472dfabfe86002baae6edb3750cdfad7f9d31133170e17622f7f53f50a
openssl-devel-0.9.8e-12.el5_4.6.i386.rpm     MD5: d4b91a68a008291d58a0b2db51a042de
SHA-256: c337e84ae0149e4b65d2a760b5fe6ba5387fe1e4f1e87336ec0c84e1329cf892
openssl-devel-0.9.8e-12.el5_4.6.x86_64.rpm     MD5: ed5f54b8093827c435b27183df17e332
SHA-256: f3d9c4da8d7005a638dea4f3bff1ee3a07814b15fee6f7e1f9f749e6ad10dad1
openssl-perl-0.9.8e-12.el5_4.6.x86_64.rpm     MD5: d92d7e8cfb95bf56853f1cfe5f25fdf2
SHA-256: a7eb3a4c22f9ad5b5c04bcf38c39947350d8e550a1b6fc6512cded2ab73f8021
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
567711 - Nessus PCI scan segfaults openssl dependent products due to kerberos enabled in openssl
569774 - CVE-2010-0433 openssl: crash caused by a missing krb5_sname_to_principal() return value check
570924 - CVE-2009-3245 openssl: missing bn_wexpand return value checks


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/