rPath Security Advisory: 2009-0008-1 Published: 2009-01-20 Products: rPath Appliance Platform Linux Service 1 rPath Appliance Platform Linux Service 2 rPath Linux 1 rPath Linux 2 Rating: Severe Exposure Level Classification: Remote Deterministic Vulnerability Updated Versions: openssl=conary.rpath.com@rpl:1/0.9.7f-10.13-1 openssl=conary.rpath.com@rpl:2/0.9.8g-7-0.1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-2942 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077 http://www.openssl.org/news/secadv_20090107.txt Description: Previous versions of OpenSSL do not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. http://wiki.rpath.com/Advisories:rPSA-2009-0008 Copyright 2009 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html