Bug 14472 - polarssl new security issues CVE-2014-8627 and CVE-2014-8628
Summary: polarssl new security issues CVE-2014-8627 and CVE-2014-8628
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/622002/
Whiteboard: MGA3TOO has_procedure MGA3-32-OK MGA4...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-11-06 14:06 CET by David Walser
Modified: 2014-11-22 11:55 CET (History)
4 users (show)

See Also:
Source RPM: polarssl-1.3.8-3.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-11-06 14:06:43 CET
CVEs have been assigned for security issues fixed upstream in polarssl:
http://openwall.com/lists/oss-security/2014/11/06/4

The issues were fixed in version 1.3.9:
https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released

Mageia 3 and Mageia 4 are also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2014-11-06 14:06:51 CET

Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 David Walser 2014-11-14 21:28:38 CET
Freeze push requested for Cauldron.

Updated packages uploaded for Mageia 3 and Mageia 4.

Advisory:
========================

Updated polarssl packages fix security vulnerability:

A regression in PolarSSL 1.3.8 resulted in servers negotiating a weaker
signature algorithm than available.  This has been fixed in PolarSSL 1.3.9
(CVE-2014-8627).

Two remotely-triggerable memory leaks were found by the Codenomicon Defensics
tool and fixed in PolarSSL 1.3.9 (CVE-2014-8628).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8628
https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released
http://openwall.com/lists/oss-security/2014/11/06/4
========================

Updated packages in core/updates_testing:
========================
polarssl-1.3.9-1.mga3
libpolarssl7-1.3.9-1.mga3
libpolarssl-devel-1.3.9-1.mga3
polarssl-1.3.9-1.mga4
libpolarssl7-1.3.9-1.mga4
libpolarssl-devel-1.3.9-1.mga4

from SRPMS:
polarssl-1.3.9-1.mga3.src.rpm
polarssl-1.3.9-1.mga4.src.rpm

CC: (none) => oe
Version: Cauldron => 4
Assignee: oe => qa-bugs
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO

Comment 2 David Walser 2014-11-14 21:29:32 CET
Testing procedure:
https://bugs.mageia.org/show_bug.cgi?id=11459#c7

Whiteboard: MGA3TOO => MGA3TOO has_procedure

Comment 3 David Walser 2014-11-17 21:04:22 CET
Tested Mageia 3 i586 and Mageia 4 i586 using Claire's procedure from Comment 2.  pdns worked fine.  polarssl-selftest passed all of the tests.  On Mageia 4, the first few times I ran it the TIMING test #3 (hardclock) failed, both with polarssl 1.3.8 and 1.3.9, but the last time I ran it with 1.3.9 it passed.  On Mageia 3 it always passed.

Whiteboard: MGA3TOO has_procedure => MGA3TOO has_procedure MGA3-32-OK MGA4-32-OK

Comment 4 Rémi Verschelde 2014-11-19 14:42:14 CET
Advisory uploaded.

CC: (none) => remi
Whiteboard: MGA3TOO has_procedure MGA3-32-OK MGA4-32-OK => MGA3TOO has_procedure MGA3-32-OK MGA4-32-OK advisory

Comment 5 David Walser 2014-11-19 19:23:13 CET
OpenSuSE has issued an advisory for this today (November 19):
http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html

URL: (none) => http://lwn.net/Vulnerabilities/622002/

Comment 6 olivier charles 2014-11-19 21:36:10 CET
Testing on Mageia 3-64 real HW

Using procedure mentionned in Comment 2

Current packages :
----------------
# rpm -q polarssl
polarssl-1.3.8-1.mga3

# polarssl-selftest
[ All tests passed ]

In pdns.conf set listen on port 5300
(local-port=5300 at the end of the file)

# dig www.example.com A @127.0.0.1 -p 5300
gave expected results

Stopped pdns service

Updated to testing packages :
---------------------------
- lib64polarssl-devel-1.3.9-1.mga3.x86_64
- lib64polarssl7-1.3.9-1.mga3.x86_64
- polarssl-1.3.9-1.mga3.x86_64

polarssl-selftest => all tests passed

Started pdns service
# dig www.example.com A @127.0.0.1 -p 5300
gave expected results

MGA3-64 passed.

CC: (none) => olchal
Whiteboard: MGA3TOO has_procedure MGA3-32-OK MGA4-32-OK advisory => MGA3TOO has_procedure MGA3-32-OK MGA4-32-OK MGA3-64-OK advisory

Comment 7 Rémi Verschelde 2014-11-21 17:24:05 CET
Validating, it's been well tested already.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2014-11-22 11:55:16 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0481.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.