Univention Bugzilla – Full Text Bug Listing |
Summary: | openssl: Denial of service (3.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Moritz Muehlenhoff <jmm> |
Component: | Security updates | Assignee: | Arvid Requate <requate> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | CC: | requate, walkenhorst |
Version: | UCS 3.2 | ||
Target Milestone: | UCS 3.2-5-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: |
Description
Moritz Muehlenhoff
2015-03-06 12:57:20 CET
Handshake with unseeded PRNG (CVE-2015-0285) Cherrypicked from errata3.2-4 (==ucs3.2-5) to errata3.2-5. CVE-2015-0285 does not apply to 0.9.8o, introduced later via upstream git commit 173e72e64c6a07ae97660c322396b66215009f33 (Mon Mar 11 15:34:28 2013) Advisory: 2015-03-18-openssl.yaml OK: aptitude install '?source-package(openssl)?installed' # i386 OK: dpkg-query -W openssl # 0.9.8o-4.91.201503181343 OK: openssl x509 -noout -text -in /etc/univention/ssl/ucsCA/CAcert.pem OK: openssl s_client -host www.univention.de -port 443 <<<'GET /' OK: r14493 patch OK: r59170 YAML OK: errata-announce -V 2015-03-18-openssl.yaml FIXED: 2015-03-18-openssl.yaml -> r59188 Additional issues: Denial of service during certificate signature algorithm verification in ASN1_TYPE_cmp function (CVE-2015-0286) Memory corruption in ASN.1 parsing. Only affects applications with rarely found strongly discouraged ASN.1 parsing flaw (CVE-2015-0287) Denial of service due to NULL pointer dereference in the PKCS#7 parsing code. Quote: "Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected." (CVE-2015-0289) Memory corruption due to missing input sanitising in base64 decoding. Could be exploited by maliciously crafted base64 data. Quote: "Any code path that reads base64 data from an untrusted source could be affected (such as the PEM processing routines). (CVE-2015-0292) (In reply to Arvid Requate from comment #4) > Additional issues: These are now all fixed in squeeze-lts: https://lists.debian.org/debian-lts-announce/2015/03/msg00014.html The upstream package has been imported ans built in errata3.2-5. Advisory is updated. OK: apt-cache policy openssl # 0.9.8o-4.96.201503231742 OK: aptitude install '?source-package(openssl)?installed' # i386 OK: zless /usr/share/doc/openssl/changelog.Debian.gz # 0.9.8o-4squeeze20 OK: openssl x509 -noout -text -in /etc/univention/ssl/ucsCA/CAcert.pem OK: openssl s_client -host www.univention.de -port 443 <<<'GET /' OK: univention-certificate check -name "$(hostname -f)" OK: univention-certificate new -name "test.$(dnsdomainname)" -days 3650 OK: echo ZW5jb2RlIG1lCg================================================================== | openssl enc -d -base64 (In reply to Arvid Requate from comment #4) OK: CVE-2015-0286 CVE-2015-0289 CVE-2015-0289 CVE-2015-0292 OK: r59331 YAML OK: errata-announce -V 2015-03-18-openssl.yaml OK: 2015-03-18-openssl.yaml |