A new openssl-blacklist update update is available for Ubuntu Linux. Here the announcement:
"Ubuntu Security Notice USN-612-11 June 18, 2008
openssl-blacklist update
http://www.ubuntu.com/usn/usn-612-1
http://www.ubuntu.com/usn/usn-612-3
http://www.ubuntu.com/usn/usn-612-8
http://www.ubuntu.com/usn/usn-612-9
==========================
==========================
=========
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
openssl-blacklist 0.3.3+0.4-0ubuntu0.6.06.2
openssl-blacklist-extra 0.3.3+0.4-0ubuntu0.6.06.2
Ubuntu 7.04:
openssl-blacklist 0.3.3+0.4-0ubuntu0.7.04.2
openssl-blacklist-extra 0.3.3+0.4-0ubuntu0.7.04.2
Ubuntu 7.10:
openssl-blacklist 0.3.3+0.4-0ubuntu0.7.10.2
openssl-blacklist-extra 0.3.3+0.4-0ubuntu0.7.10.2
Ubuntu 8.04 LTS:
openssl-blacklist 0.3.3+0.4-0ubuntu0.8.04.3
openssl-blacklist-extra 0.3.3+0.4-0ubuntu0.8.04.3
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
USN-612-3 addressed a weakness in OpenSSL certificate and key
generation and introduced openssl-blacklist to aid in detecting
vulnerable certificates and keys. This update adds RSA-4096
blacklists to the openssl-blacklist-extra package and adjusts
openssl-vulnkey to properly handle RSA-4096 and higher moduli.
Original advisory details:
A weakness has been discovered in the random number generator used
by OpenSSL on Debian and Ubuntu systems. As a result of this
weakness, certain encryption keys are much more common than they
should be, such that an attacker could guess the key through a
brute-force attack given minimal knowledge of the system. This
particularly affects the use of encryption keys in OpenSSH, OpenVPN
and SSL certificates.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.2.dsc
Size/MD5: 676 ec900c22df66e7da2543082d7123aed7
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.2.tar.gz
Size/MD5: 32928890 ff8a69186860a3c9bc78c86b51993154
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.6.06.2_all.deb
Size/MD5: 6317974 c71f0e9dfaf87712672fb52acb55db0d
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.6.06.2_all.deb
Size/MD5: 6333018 e43b4ea20935655041e803064cee6626
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.2.dsc
Size/MD5: 812 71e900154130bd20b4401b6ac2653cdc
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.2.tar.gz
Size/MD5: 32928996 37d24b96159aca653515a8aa136f31d3
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.7.04.2_all.deb
Size/MD5: 6318082 cc4e2c235c71d36653ce1c2ef1b247bc
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.04.2_all.deb
Size/MD5: 6332858 d805a05a0bc674c064256cf26f231881
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.2.dsc
Size/MD5: 812 b62d9f57a2c6f4e3e671a3d9648b1df1
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.2.tar.gz
Size/MD5: 32928995 8717c32922e43aaaf7203ccd268b99a8
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.7.10.2_all.deb
Size/MD5: 6318232 81e856d987468e3fc3a0d6e7e21bf532
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.7.10.2_all.deb
Size/MD5: 6332724 84087c5b3d5a05cf55d415adaf6974f1
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.3.dsc
Size/MD5: 943 c1d37d2d4a36ba178022fc27ff6a0bdc
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.3.tar.gz
Size/MD5: 32929040 376d57551e6859b39c2e795284978233
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist-extra_0.3.3+0.4-0ubuntu0.8.04.3_all.deb
Size/MD5: 6318142 0d1c09236b595d8fd8dbe4a617497d2e
http://security.ubuntu.com/ubuntu/pool/main/o/openssl-blacklist/openssl=
-blacklist_0.3.3+0.4-0ubuntu0.8.04.3_all.deb
Size/MD5: 6333180 df969f0af29ab3474c9d1d7b119a66a7
--JfVplkuTfB13Rsg5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIWXkRW0JvuRdL8BoRAhbyAJ4/W1FqKrXA8C/yoA1rnmj9tWU+jQCZAd3c
P8hYiKK587KXLlTsOiwp4lg=
=nTar
-----END PGP SIGNATURE-----
"
USN-612-10: OpenVPN regression
Apple ships massive Mac OS X 10.4 security upgrade
USN-612-5: OpenSSH update
This entry was posted
on 7:04 PM
.
Archives
-
▼
2008
(457)
-
▼
June
(48)
- The Perfect Desktop - OpenSUSE 11 (GNOME)
- USN-620-1: OpenSSL vulnerabilities
- CESA-2008:0290 Critical CentOS 5 x86_64 samba Update
- ruby (SSA:2008-179-01)
- Mot ships new Linux phones
- CESA-2008:0519 Important CentOS 5 x86_64 kernel Up...
- CESA-2008:0519 Important CentOS 5 i386 kernel Update
- Ubuntu MID Edition ships
- CESA-2008:0290 Critical CentOS 5 i386 samba Update
- Battle of the Titans - Mandriva vs openSUSE: The R...
- Open source phone goes mass-market
- RHSA-2008:0133-01 Moderate: IBMJava2 security update
- RHSA-2008:0508-01 Important: kernel security and b...
- Embedding Python In Apache2 With mod_python (Debia...
- CESA-2008:0556 Important CentOS 4 i386 freetype - ...
- CESA-2008:0556 Important CentOS 3 i386 freetype - ...
- CESA-2008:0558-01: Important CentOS 2 i386 freetyp...
- How To Set Up WebDAV With MySQL Authentication On ...
- GLSA 200806-07 X.Org X server: Multiple vulnerabi...
- USN-612-11: openssl-blacklist update
- Linux robot plays frenetic clarinet
- PCLinuxOS GNOME Review
- GNOME 2.23.4 Released
- Linux prominent in chip show awards
- GLSA 200806-06 Evolution: User-assisted execution...
- openSUSE 11.0 released
- CESA-2008:0503 Important CentOS 4 s390(x) xorg-x11...
- Damn Small Linux 4.4 Review
- CESA-2008:0522 Important CentOS 3 s390(x) perl - s...
- USN-617-1: Samba vulnerabilities
- GLSA 200806-05 cbrPager: User-assisted execution ...
- RHSA-2008:0532-01 Important: perl security update
- Mozilla previews Firefox Mobile
- GLSA 200806-04 rdesktop: Multiple vulnerabilities
- USN-612-10: OpenVPN regression
- CESA-2008:0498 Moderate CentOS 3 s390(x) cups - se...
- CESA-2008:0498 Moderate CentOS 3 i386 cups - secur...
- Linux macro benchmark tool stabilizes
- CESA-2008:0498 Moderate CentOS 3 x86_64 cups - sec...
- CESA-2008:0516 Critical CentOS 3 i386 evolution - ...
- GLSA 200806-02 libxslt: Execution of arbitrary code
- RHSA-2008:0498-01 Moderate: cups security update
- GLSA 200805-22 MPlayer: User-assisted execution o...
- CESA-2008:0288 Critical CentOS 4 x86_64 samba Update
- CESA-2008:0288 Critical CentOS 3 s390(x) samba - s...
- CESA-2008:0288 Critical CentOS 4 s390(x) samba - s...
- CESA-2008:0288-01: Critical CentOS 2 i386 samba se...
- RHSA-2008:0288-01 Critical: samba security update
-
▼
June
(48)