Date: Mon, 29 Oct 2018 17:51:00 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r483391 - head/security/vuxml Message-ID: <201810291751.w9THp02q038520@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Mon Oct 29 17:51:00 2018 New Revision: 483391 URL: https://svnweb.freebsd.org/changeset/ports/483391 Log: security/vuxml: Document OpenSSL 1.1.x vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Oct 29 17:43:22 2018 (r483390) +++ head/security/vuxml/vuln.xml Mon Oct 29 17:51:00 2018 (r483391) @@ -58,6 +58,47 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="238ae7de-dba2-11e8-b713-b499baebfeaf"> + <topic>OpenSSL -- Multiple vulnerabilities in 1.1 branch</topic> + <affects> + <package> + <name>openssl-devel</name> + <range><lt>1.1.0i_1</lt></range> + </package> + <package> + <name>openssl111</name> + <range><lt>1.1.1_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenSSL project reports:</p> + <blockquote cite="https://www.openssl.org/news/secadv/20181029.txt"> + <p>Timing vulnerability in ECDSA signature generation + (CVE-2018-0735): The OpenSSL ECDSA signature algorithm has been + shown to be vulnerable to a timing side channel attack. An + attacker could use variations in the signing algorithm to + recover the private key (Low).</p> + <p>Timing vulnerability in DSA signature generation (CVE-2018-0734): + Avoid a timing attack that leaks information via a side channel + that triggers when a BN is resized. Increasing the size of the + BNs prior to doing anything with them suppresses the attack (Low). + </p> + </blockquote> + </body> + </description> + <references> + <url>https://www.openssl.org/news/secadv/20181029.txt</url> + <url>https://github.com/openssl/openssl/commit/8abfe72e</url> + <cvename>CVE-2018-0735</cvename> + <cvename>CVE-2018-0734</cvename> + </references> + <dates> + <discovery>2018-10-29</discovery> + <entry>2018-10-29</entry> + </dates> + </vuln> + <vuln vid="fa194483-dabd-11e8-bf39-5404a68ad561"> <topic>liveMedia -- potential remote code execution</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201810291751.w9THp02q038520>