Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jan 2022 15:21:08 GMT
From:      Bernard Spil <brnrd@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 45061f905156 - main - security/vuxml: Document OpenSSL MIPS vulnerability
Message-ID:  <202201281521.20SFL84R047146@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by brnrd:

URL: https://cgit.FreeBSD.org/ports/commit/?id=45061f905156bbf6b2334225c8be7a41c4813a07

commit 45061f905156bbf6b2334225c8be7a41c4813a07
Author:     Bernard Spil <brnrd@FreeBSD.org>
AuthorDate: 2022-01-28 15:21:05 +0000
Commit:     Bernard Spil <brnrd@FreeBSD.org>
CommitDate: 2022-01-28 15:21:05 +0000

    security/vuxml: Document OpenSSL MIPS vulnerability
---
 security/vuxml/vuln-2022.xml | 47 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 47 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 2ff34eca31d9..e11b932683af 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,50 @@
+  <vuln vid="1aaaa5c6-804d-11ec-8be6-d4c9ef517024">
+    <topic>OpenSSL -- BN_mod_exp incorrect results on MIPS</topic>
+    <affects>
+      <package>
+	<name>openssl</name>
+	<range><lt>1.1.1m,1</lt></range>
+      </package>
+      <package>
+	<name>openssl-devel</name>
+	<range><lt>3.0.1</lt></range>
+      </package>
+      <package>
+	<name>openssl-quictls</name>
+	<range><lt>3.0.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The OpenSSL project reports:</p>
+	<blockquote cite="https://www.openssl.org/news/secadv/20220128.txt">;
+	  <p>BN_mod_exp may produce incorrect results on MIPS (Moderate)</p>
+	  <p>There is a carry propagation bug in the MIPS32 and MIPS64 squaring
+	    procedure. Many EC algorithms are affected, including some of the
+	    TLS 1.3 default curves. Impact was not analyzed in detail, because the
+	    pre-requisites for attack are considered unlikely and include reusing
+	    private keys. Analysis suggests that attacks against RSA and DSA as a
+	    result of this defect would be very difficult to perform and are not
+	    believed likely. Attacks against DH are considered just feasible
+	    (although very difficult) because most of the work necessary to deduce
+	    information about a private key may be performed offline. The amount
+	    of resources required for such an attack would be significant.
+	    However, for an attack on TLS to be meaningful, the server would have
+	    to share the DH private key among multiple clients, which is no longer
+	    an option since CVE-2016-0701.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2021-4160</cvename>
+      <url>https://www.openssl.org/news/secadv/20220128.txt</url>;
+    </references>
+    <dates>
+      <discovery>2022-01-28</discovery>
+      <entry>2022-01-28</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="65847d9d-7f3e-11ec-8624-b42e991fc52e">
     <topic>mustache - Possible Remote Code Execution</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202201281521.20SFL84R047146>