Re: OpenSSL Security Advisory

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

we are planning to do releases that would include these fixes soon.

Regards,

Tomas Mraz, OpenSSL


On Tue, 2024-01-16 at 08:19 +0000, Martin Bonner via openssl-users
wrote:
> There are now three low priority CVEs against OpenSSL 3.0 (which is
> the only one
> I care about – others will be interested in 3.1 and 3.2 too).
> 
> Are there any plans to release 3.0.13 with all of these fixed?  We
> bundle
> OpenSSL 3.0 in our software, customer IT departments run scans, and
> these
> complain about the software containing CVEs.
> 
> Yes, I know the _proper_ use of these scanners is to alert one to
> _potential_
> problems, and one should carefully consider each of the reported
> vulnerabilities
> and decide whether they are relevant or not.  The problem is that
> this requires
> thinking, and people don't like to do that if at all possible - they
> just want
> to be able to tick the box "scan run and no vulnerabilities found".
> 
> A release of 3.0.13 would allow us to satisfy these customers.
> 
> Martin Bonner
> 
> ---------------------------------------------------------------------
> -
> 
> Message: 1
> Date: Mon, 15 Jan 2024 12:32:16 +0000
> From: Tomas Mraz <mailto:tomas@xxxxxxxxxxx>
> To: mailto:openssl-project@xxxxxxxxxxx,
> mailto:openssl-users@xxxxxxxxxxx,
>         mailto:openssl-announce@xxxxxxxxxxx
> Subject: OpenSSL Security Advisory
> Message-ID: <mailto:ZaUl0KnRowwp+iAn@xxxxxxxxxxx>
> Content-Type: text/plain; charset=us-ascii
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> OpenSSL Security Advisory [15th January 2024]
> =============================================
> 
> Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
> =====================================================================
> 
> Severity: Low
> 
> Issue summary: Checking excessively long invalid RSA public keys may
> take
> a long time.
> 
> …
> 
> OpenSSL versions 3.0.0 to 3.0.12, 3.1.0 to 3.1.4 and 3.2.0 are
> vulnerable to
> this issue.
> 
> OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.
> 
> Due to the low severity of this issue we are not issuing new releases
> of
> OpenSSL at this time. The fix will be included in the next releases
> when they
> become available. The fix is also available in commit 0b0f7abf (for
> 3.2),
> commit a830f551 (for 3.1) and commit 18c02492 (for 3.0) in the
> OpenSSL git
> repository.
> 
> Any email and files/attachments transmitted with it are intended
> solely for the use of the individual or entity to whom they are
> addressed. If this message has been sent to you in error, you must
> not copy, distribute or disclose of the information it contains.
> Please notify Entrust immediately and delete the message from your
> system.

-- 
Tomáš Mráz, OpenSSL





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux