S-293: OpenSSL Security Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-293: OpenSSL Security Vulnerability
# 1  
Old 05-13-2008
S-293: OpenSSL Security Vulnerability

It was discovered that the random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package. The risk is HIGH. User's keys may be guessable allowing an attacker to assume the identity associated with the keys.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
VERSION(1SSL)							      OpenSSL							     VERSION(1SSL)

NAME
openssl-version, version - print OpenSSL version information SYNOPSIS
openssl version [-help] [-a] [-v] [-b] [-o] [-f] [-p] [-d] [-e] DESCRIPTION
This command is used to print out version information about OpenSSL. OPTIONS
-help Print out a usage message. -a All information, this is the same as setting all the other flags. -v The current OpenSSL version. -b The date the current version of OpenSSL was built. -o Option information: various options set when the library was built. -f Compilation flags. -p Platform setting. -d OPENSSLDIR setting. -e ENGINESDIR setting. NOTES
The output of openssl version -a would typically be used when sending in a bug report. COPYRIGHT
Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>. 1.1.1a 2018-12-18 VERSION(1SSL)