Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Seth Arnold (sarnold_at_wirex.com)
Date: Mon Sep 16 2002 - 13:14:34 CDT
On Mon, Sep 16, 2002 at 10:35:56AM -0700, Sam Bayne wrote:
> So what's the status and recommended fix on this much-publicized hole?
I believe our OpenSSL 0.9.6b-8_imnx_2 packages available in the 7+-beta
tree (from mid july until friday) have the official OpenSSL.org patches
for the vulnerability used in the worm.
Our OpenSSL 0.9.6g-1_imnx_1 packages available in the 7+-beta tree since
friday also have these fixes.
> Should we use the beta 7+ openssl 9.6g rpm (does it work right on 7.0?
> rpm has dependency complaints, can they be safely overridden?), or
> should we stand pat on the openssl (9.5a)in 7.0?
You cannot force the install of the 0.9.6g rpms; at least OpenSSH
will cease to function. (OpenSSH ties itself very closely to OpenSSL
versions.) The OpenSSL ABI changed between 0.9.5 and 0.9.6, so all
applications that use OpenSSL need to upgraded as well. (rpm -e openssl
ought to give you a good idea of what packages need to be upgraded.)
At this time, we do not know if these problems are stopped by StackGuard;
we are researching this question at the moment; more information will
follow. At the least, the worm doesn't have offsets for Immunix systems,
so this incarnation of the worm isn't likely to infect Immunix; however,
until we have finished our analysis of the worm, we won't know if Immunix
stops it or not. Upgrading to 7+ is recommended; it fixes many more
problems than just this OpenSSL worm. :)
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org
iD8DBQE9hh+J+9nuM9mwoJkRAge5AJ9LpLRItD5XVGtbv9U23OzKxu11WQCeKIuS 7g/S7xHZH8eZrnE18T9j39s= =LRWX -----END PGP SIGNATURE-----
_______________________________________________ Immunix-users mailing list Immunix-usersmail.wirex.com http://mail.wirex.com/mailman/listinfo/immunix-users