Openssl has new release which fix a whole bunch of crashes, memory vulnerabilities, DoS-attacks and TLS protocol issues. Details: https://www.openssl.org/news/secadv_20140806.txt Please bump to 1.0.1i (and for the older versions 1.0.0n and 0.9.8zb).
1.0.1i/0.9.8zb in the tree
Thanks, Arches please stabilize =dev-libs/openssl-1.0.1i Targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 =dev-libs/openssl-0.9.8z_p2 Targets: alpha amd64 arm ia64 ppc ppc64 sparc x86
amd64 stable
x86 stable
(In reply to Kristian Fiskerstrand from comment #2) > =dev-libs/openssl-0.9.8z_p2 > Targets: alpha amd64 arm ia64 ppc ppc64 sparc x86 Please review that list. I'm quite sure it shouldn't even be ~arch in many cases. For those cases the 0.9.8 branch should probably be reverted to ~arch so as to cause less confusion next time.
(In reply to Jeroen Roovers from comment #5) > (In reply to Kristian Fiskerstrand from comment #2) > > =dev-libs/openssl-0.9.8z_p2 > > Targets: alpha amd64 arm ia64 ppc ppc64 sparc x86 > > Please review that list. I'm quite sure it shouldn't even be ~arch in many > cases. For those cases the 0.9.8 branch should probably be reverted to ~arch > so as to cause less confusion next time. Indeed, I should have noted that if some arches doesn't want to bump 0.9.8 branch they are free to reduce it to ~arch so long as there isn't a reverse dependency on it e.g. from a binary package. On the same note, it should be considered whether it makes sense to keep the 1.0.0 branch in stable.
Stable for HPPA.
arm stable
CVE-2014-5139 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139): The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client. CVE-2014-3512 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512): Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter. CVE-2014-3511 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511): The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue. CVE-2014-3510 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510): The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. CVE-2014-3509 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509): Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. CVE-2014-3507 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507): Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. CVE-2014-3506 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506): d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values. CVE-2014-3505 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505): Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
ppc64 stable
ppc stable
@alpha/sparc: May we have some action on this bug please? It is blocking cleanup and GLSA release.
Stable for alpha.
sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. Added to an existing GLSA request.
This issue was resolved and addressed in GLSA 201412-39 at http://security.gentoo.org/glsa/glsa-201412-39.xml by GLSA coordinator Sean Amoss (ackle).