[openssl-commits] [web] master update
Matt Caswell
matt at openssl.org
Tue Jun 12 10:09:42 UTC 2018
The branch master has been updated
via 81d4522dd877e11b558579fdb89b447cf95606bb (commit)
from d04d28a092b7489bfe3831aa69e20ddc87b28bfa (commit)
- Log -----------------------------------------------------------------
commit 81d4522dd877e11b558579fdb89b447cf95606bb
Author: Matt Caswell <matt at openssl.org>
Date: Tue Jun 12 10:25:31 2018 +0100
Updates for CVE-2018-0732
Reviewed-by: Tim Hudson <tjh at openssl.org>
(Merged from https://github.com/openssl/web/pull/58)
-----------------------------------------------------------------------
Summary of changes:
news/newsflash.txt | 1 +
news/secadv/20180612.txt | 35 +++++++++++++++++++++++++++++++++++
news/vulnerabilities.xml | 48 +++++++++++++++++++++++++++++++++++++++++++++++-
3 files changed, 83 insertions(+), 1 deletion(-)
create mode 100644 news/secadv/20180612.txt
diff --git a/news/newsflash.txt b/news/newsflash.txt
index cba57e2..ce931be 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
# Format is two fields, colon-separated; the first line is the column
# headings. URL paths must all be absolute.
Date: Item
+12-Jun-2018: <a href="/news/secadv/20180612.txt">Security Advisory</a>: one low severity fix
29-May-2018: Beta 5 of OpenSSL 1.1.1 (pre release 7) is now available: please download and test it
01-May-2018: Beta 4 of OpenSSL 1.1.1 is now available: please download and test it
17-Apr-2018: Beta 3 of OpenSSL 1.1.1 is now available: please download and test it
diff --git a/news/secadv/20180612.txt b/news/secadv/20180612.txt
new file mode 100644
index 0000000..1864ace
--- /dev/null
+++ b/news/secadv/20180612.txt
@@ -0,0 +1,35 @@
+
+OpenSSL Security Advisory [12 June 2018]
+========================================
+
+Client DoS due to large DH parameter (CVE-2018-0732)
+====================================================
+
+Severity: Low
+
+During key agreement in a TLS handshake using a DH(E) based ciphersuite a
+malicious server can send a very large prime value to the client. This will
+cause the client to spend an unreasonably long period of time generating a key
+for this prime resulting in a hang until the client has finished. This could be
+exploited in a Denial Of Service attack.
+
+Due to the low severity of this issue we are not issuing a new release of
+OpenSSL 1.1.0 or 1.0.2 at this time. The fix will be included in OpenSSL 1.1.0i
+and OpenSSL 1.0.2p when they become available. The fix is also available in
+commit ea7abeeab (for 1.1.0) and commit 3984ef0b7 (for 1.0.2) in the OpenSSL git
+repository.
+
+This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken who also
+developed the fix.
+
+References
+==========
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20180612.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index bb13b7f..145e1ef 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,53 @@
<!-- The updated attribute should be the same as the first public issue,
unless an old entry was updated. -->
-<security updated="20180327">
+<security updated="20180612">
+ <issue public="20180612">
+ <impact severity="Low"/>
+ <cve name="2018-0732"/>
+ <affects base="1.1.0" version="1.1.0"/>
+ <affects base="1.1.0" version="1.1.0a"/>
+ <affects base="1.1.0" version="1.1.0b"/>
+ <affects base="1.1.0" version="1.1.0c"/>
+ <affects base="1.1.0" version="1.1.0d"/>
+ <affects base="1.1.0" version="1.1.0e"/>
+ <affects base="1.1.0" version="1.1.0f"/>
+ <affects base="1.1.0" version="1.1.0g"/>
+ <affects base="1.1.0" version="1.1.0h"/>
+ <affects base="1.0.2" version="1.0.2"/>
+ <affects base="1.0.2" version="1.0.2a"/>
+ <affects base="1.0.2" version="1.0.2b"/>
+ <affects base="1.0.2" version="1.0.2c"/>
+ <affects base="1.0.2" version="1.0.2d"/>
+ <affects base="1.0.2" version="1.0.2e"/>
+ <affects base="1.0.2" version="1.0.2f"/>
+ <affects base="1.0.2" version="1.0.2g"/>
+ <affects base="1.0.2" version="1.0.2h"/>
+ <affects base="1.0.2" version="1.0.2i"/>
+ <affects base="1.0.2" version="1.0.2j"/>
+ <affects base="1.0.2" version="1.0.2k"/>
+ <affects base="1.0.2" version="1.0.2l"/>
+ <affects base="1.0.2" version="1.0.2m"/>
+ <affects base="1.0.2" version="1.0.2n"/>
+ <affects base="1.0.2" version="1.0.2o"/>
+ <fixed base="1.1.0" version="1.1.0i-dev" date="20180612">
+ <git hash="ea7abeeabf92b7aca160bdd0208636d4da69f4f4"/>
+ </fixed>
+ <fixed base="1.0.2" version="1.0.2p-dev" date="20180612">
+ <git hash="3984ef0b72831da8b3ece4745cac4f8575b19098"/>
+ </fixed>
+ <problemtype>Client side Denial of Service</problemtype>
+ <title>Client DoS due to large DH parameter</title>
+ <description>
+ During key agreement in a TLS handshake using a DH(E) based ciphersuite
+ a malicious server can send a very large prime value to the client. This
+ will cause the client to spend an unreasonably long period of time
+ generating a key for this prime resulting in a hang until the client has
+ finished. This could be exploited in a Denial Of Service attack.
+ </description>
+ <advisory url="/news/secadv/20180416.txt"/>
+ <reported source="Guido Vranken"/>
+ </issue>
<issue public="20180416">
<impact severity="Low"/>
<cve name="2018-0737"/>
More information about the openssl-commits
mailing list