Your submission was sent successfully! Close

USN-990-1: OpenSSL vulnerability

21 September 2010




Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3
protocols. If an attacker could perform a machine-in-the-middle attack at the
start of a TLS connection, the attacker could inject arbitrary content at
the beginning of the user's session. This update adds backported support
for the new RFC5746 renegotiation extension and will use it when both the
client and the server support it.

ATTENTION: After applying this update, a patched server will allow both
patched and unpatched clients to connect, but unpatched clients will not be
able to renegotiate. For more information, please refer to the following:

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.10
Ubuntu 9.04
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 10.04

After a standard system update you need to reboot your computer to make
all the necessary changes.


Related notices

  • USN-1010-1: openjdk-6-jdk, icedtea6-plugin, openjdk-6, openjdk-6b18, openjdk-6-jre, openjdk-6-jre-headless
  • USN-990-2: apache2, apache2.2-common, apache2-common
  • USN-923-1: openjdk-6, openjdk-6-jre-lib, openjdk-6-jre
  • USN-860-1: apache2, apache2.2-common, apache2-common
  • USN-927-4: libnss3-1d, nss
  • USN-927-6: libnss3-1d, nss
  • USN-927-1: libnss3-1d, nss