| Summary: | openssl missing security update for CVE-2011-1945, CVE-2011-3207, and CVE-2011-3210 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | major | ||
| Priority: | Normal | CC: | arnaud.patard, dmorganec, fundawang, mageia, pterjan, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | openssl | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-01-01 02:53:59 CET
Hi, thanks for reporting this bug. As there is no maintainer for this package I added the committers in CC. (Please set the status to 'assigned' if you are working on it) CC:
(none) =>
arnaud.patard, fundawang, mageia, pterjan just pushed with patches in update_testing CC:
(none) =>
dmorganec Tested successfully on i586 by testing openssh and apache-mod_ssl. x86_64 The following 5 packages are going to be installed: - lib64openssl-devel-1.0.0d-2.1.mga1.x86_64 - lib64openssl-engines1.0.0-1.0.0d-2.1.mga1.x86_64 - lib64openssl-static-devel-1.0.0d-2.1.mga1.x86_64 - lib64openssl1.0.0-1.0.0d-2.1.mga1.x86_64 - openssl-1.0.0d-2.1.mga1.x86_64 Accessed zoneminder & phpmyadmin via https Testing complete x86_64 SRPM: openssl-1.0.0d-2.1.mga1.src.rpm Advisory ----------------- openssl security update for CVE-2011-1945, CVE-2011-3207, and CVE-2011-3210 ----------------- Could sysadmin please push from core/updates_testing to core/updates Thankyou! Keywords:
(none) =>
validated_update Update pushed. BTW, there was _way_ to little info in advisory for CVE fixes. I added the following: * The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation. (CVE-2011-1945) * crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past. (CVE-2011-3207) * The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8s and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages, which allows remote attackers to cause a denial of service (application crash) via out-of-order messages that violate the TLS protocol. (CVE-2011-3210) Status:
NEW =>
RESOLVED Thankyou, I didn't have anything to work from. |