Summary: | <dev-libs/openssl-{1.0.0d,0.9.8r}: OCSP stapling vulnerability (CVE-2011-0014) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Paweł Hajdan, Jr. (RETIRED) <phajdan.jr> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | laurent |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openssl.org/news/secadv_20110208.txt | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Paweł Hajdan, Jr. (RETIRED)
![]() Assuming the crash is not exploitable based on "no additional vulnerabilities are expected to be uncovered by this". 1.0.0d was in the tree before this bug was filed ... 0.9.8d wasnt explicitly announced, but it's in the tree now (In reply to comment #2) > 1.0.0d was in the tree before this bug was filed ... > > 0.9.8d wasnt explicitly announced, but it's in the tree now > Thanks, Mike. Are we ok to stabilize? And are we stabilizing 0.9.8r on x86 and amd64 only? For what it's worth, I'm using both 1.0.0d and 0.9.8d on stable amd64 systems without any issues. tested with at least lighttpd/openssh/ktorrent2 Arches, please stabilize: everyone: =dev-libs/openssl-1.0.0d just amd64 and x86: =dev-libs/openssl-0.9.8r amd64 ok ( version 1.0.0d works also on my x86hardened ) amd64 done. Thanks Agostino ppc/ppc64 stable Tested openssl 1.0.0d on SPARC, seems to be OK. Stabilise please. Stable for HPPA. arm stable Looks also good to go here on x86. x86 stable (In reply to comment #13) > x86 stable > Fauli, it seems that you forgot to stabilize =dev-libs/openssl-0.9.8r also! (In reply to comment #14) > (In reply to comment #13) > > x86 stable > > > Fauli, it seems that you forgot to stabilize =dev-libs/openssl-0.9.8r also! Thanks for the heads up. The CVS outage confused me. x86 done for real. Stable on alpha. ia64/m68k/s390/sh/sparc stable Thanks, everyone. Added to existing GLSA request. CVE-2011-0014 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0014): ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability." This issue was resolved and addressed in 201110-01 at http://security.gentoo.org/glsa/glsa-201110-01.xml by GLSA coordinator Tobias Heinlein (keytoaster). This issue was resolved and addressed in 201110-01 at http://security.gentoo.org/glsa/glsa-201110-01.xml by GLSA coordinator Tobias Heinlein (keytoaster). |