Mageia 2021-0108: openssl and compat-openssl10 security update
Summary
Paul Kehrer discovered that OpenSSL incorrectly handled certain input lengths
in EVP functions. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service (CVE-2021-23840).
Tavis Ormandy discovered that OpenSSL incorrectly handled parsing issuer
fields. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service (CVE-2021-23841).
References
- https://bugs.mageia.org/show_bug.cgi?id=28383
- https://www.openssl.org/news/secadv/20210216.txt
- https://ubuntu.com/security/notices/USN-4738-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
Resolution
MGASA-2021-0108 - Updated openssl and compat-openssl10 packages fix security vulnerabilities
SRPMS
- 8/core/openssl-1.1.1j-1.mga8
- 7/core/openssl-1.1.0l-1.3.mga7
- 7/core/compat-openssl10-1.0.2u-1.2.mga7