Mageia 2021-0108: openssl and compat-openssl10 security update
Mageia 2021-0108: openssl and compat-openssl10 security update
Paul Kehrer discovered that OpenSSL incorrectly handled certain input lengths in EVP functions. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service (CVE-2021-23840). Tavis Ormandy discovered that OpenSSL incorrectly handled parsing issuer
MGASA-2021-0108 - Updated openssl and compat-openssl10 packages fix security vulnerabilities Publication date: 04 Mar 2021 URL: https://advisories.mageia.org/MGASA-2021-0108.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2021-23840, CVE-2021-23841 Paul Kehrer discovered that OpenSSL incorrectly handled certain input lengths in EVP functions. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service (CVE-2021-23840). Tavis Ormandy discovered that OpenSSL incorrectly handled parsing issuer fields. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service (CVE-2021-23841). References: - https://bugs.mageia.org/show_bug.cgi?id=28383 - https://www.openssl.org/news/secadv/20210216.txt - https://ubuntu.com/security/notices/USN-4738-1 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841 SRPMS: - 8/core/openssl-1.1.1j-1.mga8 - 7/core/openssl-1.1.0l-1.3.mga7 - 7/core/compat-openssl10-1.0.2u-1.2.mga7