[openssl-commits] [web] master update

Matt Caswell matt at openssl.org
Tue Jun 12 10:09:42 UTC 2018


The branch master has been updated
       via  81d4522dd877e11b558579fdb89b447cf95606bb (commit)
      from  d04d28a092b7489bfe3831aa69e20ddc87b28bfa (commit)


- Log -----------------------------------------------------------------
commit 81d4522dd877e11b558579fdb89b447cf95606bb
Author: Matt Caswell <matt at openssl.org>
Date:   Tue Jun 12 10:25:31 2018 +0100

    Updates for CVE-2018-0732
    
    Reviewed-by: Tim Hudson <tjh at openssl.org>
    (Merged from https://github.com/openssl/web/pull/58)

-----------------------------------------------------------------------

Summary of changes:
 news/newsflash.txt       |  1 +
 news/secadv/20180612.txt | 35 +++++++++++++++++++++++++++++++++++
 news/vulnerabilities.xml | 48 +++++++++++++++++++++++++++++++++++++++++++++++-
 3 files changed, 83 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20180612.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index cba57e2..ce931be 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+12-Jun-2018: <a href="/news/secadv/20180612.txt">Security Advisory</a>: one low severity fix
 29-May-2018: Beta 5 of OpenSSL 1.1.1 (pre release 7) is now available: please download and test it
 01-May-2018: Beta 4 of OpenSSL 1.1.1 is now available: please download and test it
 17-Apr-2018: Beta 3 of OpenSSL 1.1.1 is now available: please download and test it
diff --git a/news/secadv/20180612.txt b/news/secadv/20180612.txt
new file mode 100644
index 0000000..1864ace
--- /dev/null
+++ b/news/secadv/20180612.txt
@@ -0,0 +1,35 @@
+
+OpenSSL Security Advisory [12 June 2018]
+========================================
+
+Client DoS due to large DH parameter (CVE-2018-0732)
+====================================================
+
+Severity: Low
+
+During key agreement in a TLS handshake using a DH(E) based ciphersuite a
+malicious server can send a very large prime value to the client. This will
+cause the client to spend an unreasonably long period of time generating a key
+for this prime resulting in a hang until the client has finished. This could be
+exploited in a Denial Of Service attack.
+
+Due to the low severity of this issue we are not issuing a new release of
+OpenSSL 1.1.0 or 1.0.2 at this time. The fix will be included in OpenSSL 1.1.0i
+and OpenSSL 1.0.2p when they become available. The fix is also available in
+commit ea7abeeab (for 1.1.0) and commit 3984ef0b7 (for 1.0.2) in the OpenSSL git
+repository.
+
+This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken who also
+developed the fix.
+
+References
+==========
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20180612.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index bb13b7f..145e1ef 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,53 @@
 
 <!-- The updated attribute should be the same as the first public issue,
      unless an old entry was updated. -->
-<security updated="20180327">
+<security updated="20180612">
+  <issue public="20180612">
+    <impact severity="Low"/>
+    <cve name="2018-0732"/>
+    <affects base="1.1.0" version="1.1.0"/>
+    <affects base="1.1.0" version="1.1.0a"/>
+    <affects base="1.1.0" version="1.1.0b"/>
+    <affects base="1.1.0" version="1.1.0c"/>
+    <affects base="1.1.0" version="1.1.0d"/>
+    <affects base="1.1.0" version="1.1.0e"/>
+    <affects base="1.1.0" version="1.1.0f"/>
+    <affects base="1.1.0" version="1.1.0g"/>
+    <affects base="1.1.0" version="1.1.0h"/>
+    <affects base="1.0.2" version="1.0.2"/>
+    <affects base="1.0.2" version="1.0.2a"/>
+    <affects base="1.0.2" version="1.0.2b"/>
+    <affects base="1.0.2" version="1.0.2c"/>
+    <affects base="1.0.2" version="1.0.2d"/>
+    <affects base="1.0.2" version="1.0.2e"/>
+    <affects base="1.0.2" version="1.0.2f"/>
+    <affects base="1.0.2" version="1.0.2g"/>
+    <affects base="1.0.2" version="1.0.2h"/>
+    <affects base="1.0.2" version="1.0.2i"/>
+    <affects base="1.0.2" version="1.0.2j"/>
+    <affects base="1.0.2" version="1.0.2k"/>
+    <affects base="1.0.2" version="1.0.2l"/>
+    <affects base="1.0.2" version="1.0.2m"/>
+    <affects base="1.0.2" version="1.0.2n"/>
+    <affects base="1.0.2" version="1.0.2o"/>
+    <fixed base="1.1.0" version="1.1.0i-dev" date="20180612">
+      <git hash="ea7abeeabf92b7aca160bdd0208636d4da69f4f4"/>
+    </fixed>
+    <fixed base="1.0.2" version="1.0.2p-dev" date="20180612">
+      <git hash="3984ef0b72831da8b3ece4745cac4f8575b19098"/>
+    </fixed>
+    <problemtype>Client side Denial of Service</problemtype>
+    <title>Client DoS due to large DH parameter</title>
+    <description>
+        During key agreement in a TLS handshake using a DH(E) based ciphersuite
+        a malicious server can send a very large prime value to the client. This
+        will cause the client to spend an unreasonably long period of time
+        generating a key for this prime resulting in a hang until the client has
+        finished. This could be exploited in a Denial Of Service attack.
+    </description>
+    <advisory url="/news/secadv/20180416.txt"/>
+    <reported source="Guido Vranken"/>
+  </issue>
   <issue public="20180416">
     <impact severity="Low"/>
     <cve name="2018-0737"/>


More information about the openssl-commits mailing list