Bug 37494

Summary: openssl: Multiple issues (4.0)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Moritz Muehlenhoff <jmm>
Status: CLOSED FIXED QA Contact: Janek Walkenhorst <walkenhorst>
Severity: normal    
Priority: P3    
Version: UCS 4.0   
Target Milestone: UCS 4.0-0-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Moritz Muehlenhoff univentionstaff 2015-01-09 07:23:15 CET
Denial of service in DTLS (2014-3571, CVE-2015-0206)

ECDHE can be downgraded to ECDH, resulting in a loss of forward secrecy (CVE-2014-3572)
Weaker RSA keys can be negotiated (CVE-2015-0204)
AFAICS these can only be exploited by a malicous server.

An OpenSSL server will accept a DH certificate for client authentication
without the certificate verify message (CVE-2015-0205)

Certificate fingerprints can be modified (CVE-2014-8275)

Bignum squaring may produce incorrect results (CVE-2014-3570)
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-12 10:47:03 CET
Update has been built, tests and test suite were fine.

I've also tested the ucs-test modules base, samba and ldap, which were also fine.

YAML file: 2015-01-12-openssl.yaml
Comment 2 Janek Walkenhorst univentionstaff 2015-01-12 15:29:40 CET
Tests: OK
Advisory: OK
Comment 3 Moritz Muehlenhoff univentionstaff 2015-01-13 11:25:42 CET
http://errata.univention.de/ucs/4.0/26.html
Comment 4 Janis Meybohm univentionstaff 2015-03-05 07:13:17 CET
(In reply to Moritz Muehlenhoff from comment #3)
http://errata.univention.de/ucs/4.0/27.html acutally