Linux Today: Linux News On Internet Time.

More on LinuxToday

Trustix Secure Linux Advisory: openssl

Feb 22, 2003, 12:59 (0 Talkback[s])

WEBINAR: On-demand Event

Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0005

Package name:      openssl
Summary:           Security fix
Date:              2003-02-20
Affected versions: TSL 1.1, 1.2, 1.5

- --------------------------------------------------------------------------
Package description:
  A C library that provides various crytographic algorithms and protocols,
  including DES, RC4, RSA, and SSL. Includes shared libraries.

Problem description:
  From the openssl advisory:
  OpenSSL version since 0.9.6c supposedly treat block cipher padding
  errors like MAC verification errors during record decryption
  (see, but MAC verification
  was still skipped after detection of a padding error, which allowed
  the timing attack.  (Note that it is likely that other SSL/TLS
  implementations will have similar problems.)

  OpenSSL 0.9.6i and 0.9.7a perform a MAC computation even if incorrrect
  block cipher padding has been found to minimize information leaked via
  timing.  For earlier versions starting with 0.9.6e, the enclosed
  security patch can be used.

  We recommend that all systems with this package installed be upgraded.

  All TSL updates are available from

About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.

Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:

Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at

  Check out our mailing lists:

  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:

  The advisory itself is available from the errata pages at
  <URI:>; and
  or directly at

MD5sums of the packages:
- --------------------------------------------------------------------------
641cc1ec2c74ba8cb398495b71343c17  ./1.5/SRPMS/openssl-0.9.6-12tr.src.rpm
e1847c407ff203d8fa9a92edceb0ec3f  ./1.5/RPMS/openssl-support-0.9.6-12tr.i586.rpm
3e8330fbeca0065f7110f3617b49d4cb  ./1.5/RPMS/openssl-python-0.9.6-12tr.i586.rpm
d6f750a842a25696844bdac0fdd3088d  ./1.5/RPMS/openssl-devel-0.9.6-12tr.i586.rpm
e02fabb3aeefa3bcacb6722348d73bf3  ./1.5/RPMS/openssl-0.9.6-12tr.i586.rpm
641cc1ec2c74ba8cb398495b71343c17  ./1.2/SRPMS/openssl-0.9.6-12tr.src.rpm
e51a2ebce95d3cf48996f3329b6afcf9  ./1.2/RPMS/openssl-support-0.9.6-12tr.i586.rpm
ccb26bafabae3ad619d8d2ff4d76b8c6  ./1.2/RPMS/openssl-python-0.9.6-12tr.i586.rpm
0003d4d1f1227a9afebcfe88eec8f59f  ./1.2/RPMS/openssl-devel-0.9.6-12tr.i586.rpm
d4283b1a16b1d7b134f05d9b94f390f8  ./1.2/RPMS/openssl-0.9.6-12tr.i586.rpm
641cc1ec2c74ba8cb398495b71343c17  ./1.1/SRPMS/openssl-0.9.6-12tr.src.rpm
973703fdbf2193af26d488f5c9c13046  ./1.1/RPMS/openssl-support-0.9.6-12tr.i586.rpm
5d2688fa3e10cd651e382b5995b37f0b  ./1.1/RPMS/openssl-python-0.9.6-12tr.i586.rpm
efdc6af94f7c9a3d5e4250995743fcea  ./1.1/RPMS/openssl-devel-0.9.6-12tr.i586.rpm
e18b06c12d94fd5d9bb4b900a4135185  ./1.1/RPMS/openssl-0.9.6-12tr.i586.rpm
- --------------------------------------------------------------------------

Trustix Security Team