| Summary: | openssl new security issues CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | luigiwalser, sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/601413/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | openssl-1.0.1e-8.5.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2014-06-05 14:17:21 CEST
RedHat has issued an advisory for this today (June 5): https://rhn.redhat.com/errata/RHSA-2014-0625.html Updated package uploaded for Cauldron. Patched packages uploaded for Mageia 3 and Mageia 4. Note that CVE-2010-5298 and CVE-2014-0198 were already fixed in Bug 13210 and Bug 13309, respectively. Advisory: ======================== Updated openssl packages fix security vulnerabilities: It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224) Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL. For more information about this flaw, refer to RedHat article 904433 in the references. All currently supported versions of Mageia are running OpenSSL 1.0.1. A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. A remote attacker could possibly use this flaw to execute arbitrary code on a DTLS client or server. (CVE-2014-0195) A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221) A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470) References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 https://www.openssl.org/news/secadv_20140605.txt https://access.redhat.com/site/articles/904433 https://rhn.redhat.com/errata/RHSA-2014-0625.html ======================== Updated packages in core/updates_testing: ======================== openssl-1.0.1e-1.9.mga3 libopenssl-engines1.0.0-1.0.1e-1.9.mga3 libopenssl1.0.0-1.0.1e-1.9.mga3 libopenssl-devel-1.0.1e-1.9.mga3 libopenssl-static-devel-1.0.1e-1.9.mga3 openssl-1.0.1e-8.6.mga4 libopenssl-engines1.0.0-1.0.1e-8.6.mga4 libopenssl1.0.0-1.0.1e-8.6.mga4 libopenssl-devel-1.0.1e-8.6.mga4 libopenssl-static-devel-1.0.1e-8.6.mga4 from SRPMS: openssl-1.0.1e-1.9.mga3.src.rpm openssl-1.0.1e-8.6.mga4.src.rpm Version:
3 =>
4 LWN reference for CVE-2014-0224: http://lwn.net/Vulnerabilities/601412/ URL:
http://www.openssl.org/news/secadv_20140605.txt =>
http://lwn.net/Vulnerabilities/601413/ https://wiki.mageia.org/en/QA_procedure:Openssl Testing mga4 32 & 64 now Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure Testing complete mga4 32 & 64 Testing mga3 now Whiteboard:
MGA3TOO has_procedure =>
MGA3TOO has_procedure mga4-32-ok mga4-64-ok Testing complete mga3 32 & 64 Whiteboard:
MGA3TOO has_procedure mga4-32-ok mga4-64-ok =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok Validating. Advisory uploaded. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2014-0255.html Status:
NEW =>
RESOLVED |