USN-990-1: OpenSSL vulnerability
21 September 2010
Releases
Packages
- openssl -
Details
Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a machine-in-the-middle attack at the
start of a TLS connection, the attacker could inject arbitrary content at
the beginning of the user's session. This update adds backported support
for the new RFC5746 renegotiation extension and will use it when both the
client and the server support it.
ATTENTION: After applying this update, a patched server will allow both
patched and unpatched clients to connect, but unpatched clients will not be
able to renegotiate. For more information, please refer to the following:
http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html#SECURE_RENEGOTIATION
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
Ubuntu 9.04
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 10.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-1010-1: openjdk-6-jre-headless, openjdk-6, openjdk-6-jre, icedtea6-plugin, openjdk-6-jdk, openjdk-6b18
- USN-990-2: apache2, apache2-common, apache2.2-common
- USN-923-1: openjdk-6-jre, openjdk-6, openjdk-6-jre-lib
- USN-860-1: apache2, apache2-common, apache2.2-common
- USN-927-4: nss, libnss3-1d
- USN-927-6: nss, libnss3-1d
- USN-927-1: nss, libnss3-1d