Summary: | <dev-libs/openssl-{0.9.8x,1.0.0j}: Invalid TLS/DTLS record attack (CVE-2012-2333) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openssl.org/news/secadv_20120510.txt | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() already in the tree okiedokiethanks. Arches, please test and mark stable: =dev-libs/openssl-1.0.0j Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" =dev-libs/openssl-0.9.8x Target keywords : "amd64 x86" x86 stable Stable on alpha. Stable for HPPA. arm/ia64/m68k/s390/sh/sparc stable amd64 stable ppc/ppc64 done Thanks, everyone. Added to existing GLSA request. CVE-2012-2333 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2333): Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation. This issue was resolved and addressed in GLSA 201312-03 at http://security.gentoo.org/glsa/glsa-201312-03.xml by GLSA coordinator Chris Reffett (creffett). |