USN-990-1: OpenSSL vulnerability

21 September 2010

Releases

Packages

Details

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a man in the middle attack at the
start of a TLS connection, the attacker could inject arbitrary content at
the beginning of the user's session. This update adds backported support
for the new RFC5746 renegotiation extension and will use it when both the
client and the server support it.

ATTENTION: After applying this update, a patched server will allow both
patched and unpatched clients to connect, but unpatched clients will not be
able to renegotiate. For more information, please refer to the following:
http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html#SECURE_RENEGOTIATION

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.10
Ubuntu 9.04
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 10.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

Related notices

  • USN-1010-1: openjdk-6-jre, openjdk-6, openjdk-6b18, icedtea6-plugin, openjdk-6-jre-headless, openjdk-6-jdk
  • USN-860-1: apache2-common, apache2, apache2.2-common
  • USN-923-1: openjdk-6-jre, openjdk-6, openjdk-6-jre-lib
  • USN-927-1: libnss3-1d, nss
  • USN-927-4: libnss3-1d, nss
  • USN-927-6: libnss3-1d, nss
  • USN-990-2: apache2-common, apache2, apache2.2-common