diff options
author | Bernard Spil <brnrd@FreeBSD.org> | 2018-10-29 17:51:00 +0000 |
---|---|---|
committer | Bernard Spil <brnrd@FreeBSD.org> | 2018-10-29 17:51:00 +0000 |
commit | b1b8c8a29a9ccf3dc5b60dd662539d916484aca7 (patch) | |
tree | 99f62152fd10ad8f7e1661b3460a68b1b6f270f4 | |
parent | 3c09c1f089787788e0fff265132f308dc064cc5c (diff) | |
download | ports-b1b8c8a29a9ccf3dc5b60dd662539d916484aca7.tar.gz ports-b1b8c8a29a9ccf3dc5b60dd662539d916484aca7.zip |
security/vuxml: Document OpenSSL 1.1.x vulnerabilities
Notes
Notes:
svn path=/head/; revision=483391
-rw-r--r-- | security/vuxml/vuln.xml | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index da282546bf57..cfb77b74b6d8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,47 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="238ae7de-dba2-11e8-b713-b499baebfeaf"> + <topic>OpenSSL -- Multiple vulnerabilities in 1.1 branch</topic> + <affects> + <package> + <name>openssl-devel</name> + <range><lt>1.1.0i_1</lt></range> + </package> + <package> + <name>openssl111</name> + <range><lt>1.1.1_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenSSL project reports:</p> + <blockquote cite="https://www.openssl.org/news/secadv/20181029.txt"> + <p>Timing vulnerability in ECDSA signature generation + (CVE-2018-0735): The OpenSSL ECDSA signature algorithm has been + shown to be vulnerable to a timing side channel attack. An + attacker could use variations in the signing algorithm to + recover the private key (Low).</p> + <p>Timing vulnerability in DSA signature generation (CVE-2018-0734): + Avoid a timing attack that leaks information via a side channel + that triggers when a BN is resized. Increasing the size of the + BNs prior to doing anything with them suppresses the attack (Low). + </p> + </blockquote> + </body> + </description> + <references> + <url>https://www.openssl.org/news/secadv/20181029.txt</url> + <url>https://github.com/openssl/openssl/commit/8abfe72e</url> + <cvename>CVE-2018-0735</cvename> + <cvename>CVE-2018-0734</cvename> + </references> + <dates> + <discovery>2018-10-29</discovery> + <entry>2018-10-29</entry> + </dates> + </vuln> + <vuln vid="fa194483-dabd-11e8-bf39-5404a68ad561"> <topic>liveMedia -- potential remote code execution</topic> <affects> |