[openssl-commits] [web] master update

Mark J. Cox mark at openssl.org
Wed Jan 17 14:37:54 UTC 2018


The branch master has been updated
       via  3ce25987564d4a98da666c17dbf6feb70b4e16ed (commit)
      from  18c21788f12170c543d93a72f5e55febe1d9bf20 (commit)


- Log -----------------------------------------------------------------
commit 3ce25987564d4a98da666c17dbf6feb70b4e16ed
Author: Mark J. Cox <mark at awe.com>
Date:   Wed Jan 17 14:36:16 2018 +0000

    Working on conversion of the xml to Mitre JSON; there are a few
    issues that fail validation due to 1) missing affects (fixed)
    and 2) missing references.  Some are still missing references
    as there was no security advisory and I'll link to the commits
    instead over time.

-----------------------------------------------------------------------

Summary of changes:
 news/vulnerabilities.xml | 7 ++++++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index c96da20..9e022e4 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -4356,6 +4356,8 @@ large session ID in SSL3.
   <issue public="20020730">
     <cve name="2002-0657"/>
     <advisory url="/news/secadv/20020730.txt"/>
+    <affects base="0.9.7" version="0.9.7-beta3"/>    
+    <fixed base="0.9.7" version="0.9.7" date="20021210"/>    
     <reported source="OpenSSL Group (A.L. Digital)"/>
     <description>
 A buffer overflow when Kerberos is enabled allowed attackers
@@ -4366,6 +4368,7 @@ flaw did not affect any released version of 0.9.6 or 0.9.7
 
   <issue public="20020730">
     <cve name="2002-0659"/>
+    <advisory url="/news/secadv/20020730.txt"/>
     <affects base="0.9.6" version="0.9.6a"/>
     <affects base="0.9.6" version="0.9.6b"/>
     <affects base="0.9.6" version="0.9.6c"/>
@@ -4944,7 +4947,8 @@ only when applications are compiled for debugging.
     <cve name="2007-5502"/>
     <advisory url="/news/secadv/20071129.txt"/>
     <reported source="Geoff Lowe"/>
-
+    <affects base="fips-1.1" version="fips-1.1.1"/>
+    <fixed base="fips-1.1" version="fips-1.1.2" date="20071201"/>
     <description>
 The PRNG implementation for the OpenSSL FIPS Object Module 1.1.1 does
 not perform auto-seeding during the FIPS self-test, which generates
@@ -6046,6 +6050,7 @@ server could use this flaw to crash a connecting client.  This issue only affect
 
   <issue public="20140214">
     <cve name="2014-0076"/>
+    <advisory url="https://www.openssl.org/news/secadv/20140605.txt"/>
     <affects base="0.9.8" version="0.9.8"/>
     <affects base="0.9.8" version="0.9.8a"/>
     <affects base="0.9.8" version="0.9.8b"/>


More information about the openssl-commits mailing list