---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Mandriva update for openssl SECUNIA ADVISORY ID: SA15612 VERIFY ADVISORY: http://secunia.com/advisories/15612/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: Local system OPERATING SYSTEM: Mandrake Corporate Server 2.x http://secunia.com/product/1222/ Mandrakelinux 10.0 http://secunia.com/product/3918/ Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. For more information: SA15348 SOLUTION: Apply updated packages. Mandrakelinux 10.0: cee49155c0a92bb8135a319fd7932c91 10.0/RPMS/libopenssl0.9.7-0.9.7c-3.2.100mdk.i586.rpm 2c80ea6436e6a6c6466a917f52d2390c 10.0/RPMS/libopenssl0.9.7-devel-0.9.7c-3.2.100mdk.i586.rpm 52d0e353df687a95873de42742662654 10.0/RPMS/libopenssl0.9.7-static-devel-0.9.7c-3.2.100mdk.i586.rpm 292de5de390f0ef4692d31309b9bde11 10.0/RPMS/openssl-0.9.7c-3.2.100mdk.i586.rpm ee45559e7e24574e13c6a67c74f7133d 10.0/SRPMS/openssl-0.9.7c-3.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64: e301b8be00577ccc4e2b1efd7f413179 amd64/10.0/RPMS/lib64openssl0.9.7-0.9.7c-3.2.100mdk.amd64.rpm f8c587ca420c66ca24e951b59834c963 amd64/10.0/RPMS/lib64openssl0.9.7-devel-0.9.7c-3.2.100mdk.amd64.rpm a06d5783022cd8a9b5c79c680661d174 amd64/10.0/RPMS/lib64openssl0.9.7-static-devel-0.9.7c-3.2.100mdk.amd64.rpm 464d4ea1d39a0679108adb8ac165cdce amd64/10.0/RPMS/openssl-0.9.7c-3.2.100mdk.amd64.rpm ee45559e7e24574e13c6a67c74f7133d amd64/10.0/SRPMS/openssl-0.9.7c-3.2.100mdk.src.rpm Mandrakelinux 10.1: de2ad60c1e4f2a65530e306de708dcbd 10.1/RPMS/libopenssl0.9.7-0.9.7d-1.2.101mdk.i586.rpm f061104d9da8c4321a724b3497eadf44 10.1/RPMS/libopenssl0.9.7-devel-0.9.7d-1.2.101mdk.i586.rpm 5733754aba4dfe0d216a9d2c3a586fc3 10.1/RPMS/libopenssl0.9.7-static-devel-0.9.7d-1.2.101mdk.i586.rpm d85002e7e972e92649143f32843921c2 10.1/RPMS/openssl-0.9.7d-1.2.101mdk.i586.rpm ae8b9201966a40154c936e86c66ed6ee 10.1/SRPMS/openssl-0.9.7d-1.2.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 9cb7b4a822ee946c9bfbfd58eab266db x86_64/10.1/RPMS/lib64openssl0.9.7-0.9.7d-1.2.101mdk.x86_64.rpm 8d3cee9ae100bdc96680d1f2981c605c x86_64/10.1/RPMS/lib64openssl0.9.7-devel-0.9.7d-1.2.101mdk.x86_64.rpm d5567a5ed0e73448718be767d15c909f x86_64/10.1/RPMS/lib64openssl0.9.7-static-devel-0.9.7d-1.2.101mdk.x86_64.rpm 7fd69749f62ac883da9d5c25a6a9d20b x86_64/10.1/RPMS/openssl-0.9.7d-1.2.101mdk.x86_64.rpm ae8b9201966a40154c936e86c66ed6ee x86_64/10.1/SRPMS/openssl-0.9.7d-1.2.101mdk.src.rpm Corporate Server 2.1: 6501a7b2d19013ca711281fb353dea0b corporate/2.1/RPMS/libopenssl0-0.9.6i-1.9.C21mdk.i586.rpm d559b800134dd67dbb7f012fc48a807b corporate/2.1/RPMS/libopenssl0-devel-0.9.6i-1.9.C21mdk.i586.rpm b6125ddcc2ba183ce6c1da6a3d1a636f corporate/2.1/RPMS/libopenssl0-static-devel-0.9.6i-1.9.C21mdk.i586.rpm c2fb9fbd3ccbc10615d291fbfff2c24a corporate/2.1/RPMS/openssl-0.9.6i-1.9.C21mdk.i586.rpm eeb2c5885af72a4bbe7bb67defa1dc3d corporate/2.1/SRPMS/openssl-0.9.6i-1.9.C21mdk.src.rpm Corporate Server 2.1/X86_64: 16deadec23cf0f734428c54cd30d77c1 x86_64/corporate/2.1/RPMS/libopenssl0-0.9.6i-1.9.C21mdk.x86_64.rpm 8ebda70886c54271c9717310e58f7cf0 x86_64/corporate/2.1/RPMS/libopenssl0-devel-0.9.6i-1.9.C21mdk.x86_64.rpm 3e71a68e38fc41d553ac0ccd113b2062 x86_64/corporate/2.1/RPMS/libopenssl0-static-devel-0.9.6i-1.9.C21mdk.x86_64.rpm 34e577f8a74f1ccb5256da88871f175b x86_64/corporate/2.1/RPMS/openssl-0.9.6i-1.9.C21mdk.x86_64.rpm eeb2c5885af72a4bbe7bb67defa1dc3d x86_64/corporate/2.1/SRPMS/openssl-0.9.6i-1.9.C21mdk.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2005:096 OTHER REFERENCES: SA15348: http://secunia.com/advisories/15348/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------