[Git][security-tracker-team/security-tracker][master] 2 commits: Mark CVE-2018-0735 as not-affected for openssl1.0
Salvatore Bonaccorso
carnil at debian.org
Fri Nov 23 04:59:21 GMT 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
02e6e8b0 by Salvatore Bonaccorso at 2018-11-23T04:57:14Z
Mark CVE-2018-0735 as not-affected for openssl1.0
>From IRC discussion:
< bigeasy> for CVE-2018-0735 I would remove openssl1.0 because it was fixed as part of CVE-2018-5407. Any objections?
< jmm_> bigeasy: sounds good
< carnil> or actually track it as fixed with the same version?
< bigeasy> DLA did that but upstream never release an advisory for 1.0.2. Only 1.1.0 and 1.1.1. And then they backported the whole function which already included CVE-2018-0735.
< bigeasy> but if you want I can instead mark in the changelog for 1.0.2. it is up to you guys
< Q_> bigeasy: As far as I know, those CVEs have nothing to do with each other?
< bigeasy> well. CVE-2018-0735 does a +1 -> +2 in one place and this function gets copied as as part of CVE-2018-5407.
< bigeasy> so there is that. however CVE-2018-0735 somehow ended in the securtiy-tracker for 1.0.2/openssl1.0 and I just asked for permission to remove it
< Q_> Right, the vulnerable code was never present in 1.0.2.
As such add back the src:openssl1.0 source package back but make clear
why it is not affected as the vulnerable code never landed in a 1.0.2
release.
Partially reverts 12615d5f9f41 ("Remove CVE-2018-0735 from openssl1.0").
- - - - -
157bb201 by Salvatore Bonaccorso at 2018-11-23T04:58:06Z
Four CVEs fixed in openssl1.0 via unstable upload
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -37839,7 +37839,7 @@ CVE-2018-5408
CVE-2018-5407 (Simultaneous Multi-threading (SMT) in processors can enable local ...)
{DLA-1586-1}
- openssl 1.1.1~~pre9-1
- - openssl1.0 <unfixed>
+ - openssl1.0 1.0.2q-1
NOTE: https://www.openssl.org/news/secadv/20181112.txt
NOTE: OpenSSL_1_0_2-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=b18162a7c9bbfb57112459a4d6631fa258fd8c0c
NOTE: https://www.openwall.com/lists/oss-security/2018/11/01/4
@@ -51972,7 +51972,7 @@ CVE-2018-0737 (The OpenSSL RSA Key generation algorithm has been shown to be ...
- openssl 1.1.0h-3 (low; bug #895844)
[stretch] - openssl <postponed> (Can wait for next DSA and upstream release)
[wheezy] - openssl <postponed> (Can wait for next update)
- - openssl1.0 <unfixed> (low; bug #895845)
+ - openssl1.0 1.0.2q-1 (low; bug #895845)
[stretch] - openssl1.0 <postponed> (Can wait for next DSA and upstream release)
NOTE: https://www.openssl.org/news/secadv/20180416.txt
NOTE: OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787
@@ -51984,6 +51984,7 @@ CVE-2018-0735 (The OpenSSL ECDSA signature algorithm has been shown to be vulner
{DLA-1586-1}
- openssl 1.1.1a-1
[stretch] - openssl <postponed> (Wait for next DSA and upstream release)
+ - openssl1.0 <not-affected> (Vulnerable code never present in 1.0.2 series)
NOTE: https://www.openssl.org/news/secadv/20181029.txt
NOTE: OpenSSL_1_1_1-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
NOTE: OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=56fb454d281a023b3f950d969693553d3f3ceea1
@@ -51991,7 +51992,7 @@ CVE-2018-0734 (The OpenSSL DSA signature algorithm has been shown to be vulnerab
- openssl 1.1.1a-1
[stretch] - openssl <postponed> (Wait for next DSA and upstream release)
[jessie] - openssl <postponed> (vulnerable code not present, but see note below)
- - openssl1.0 <unfixed>
+ - openssl1.0 1.0.2q-1
[stretch] - openssl1.0 <postponed> (Wait for next DSA and upstream release)
NOTE: https://www.openssl.org/news/secadv/20181030.txt
NOTE: OpenSSL_1_1_1-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
@@ -52014,7 +52015,7 @@ CVE-2018-0732 (During key agreement in a TLS handshake using a DH(E) based ...)
{DLA-1449-1}
- openssl 1.1.1-1 (low)
[stretch] - openssl <postponed> (Minor issue, can be fixed along with next OpenSSL security release)
- - openssl1.0 <unfixed> (low)
+ - openssl1.0 1.0.2q-1 (low)
[stretch] - openssl1.0 <postponed> (Minor issue, can be fixed along with next OpenSSL security release)
NOTE: OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
NOTE: OpenSSL_1_0_2-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=3984ef0b72831da8b3ece4745cac4f8575b19098
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/78575bd3ae229c18de627e33aeaddd26c0a6af3e...157bb2011c4dcfc5c630a4f1353b0f8672d80d65
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/78575bd3ae229c18de627e33aeaddd26c0a6af3e...157bb2011c4dcfc5c630a4f1353b0f8672d80d65
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181123/368f7efc/attachment.html>
More information about the debian-security-tracker-commits
mailing list