Lucene search

K
mageiaGentoo FoundationMGASA-2024-0020
HistoryFeb 04, 2024 - 5:49 a.m.

Updated openssl packages fix security vulnerabilities

2024-02-0405:49:27
Gentoo Foundation
advisories.mageia.org
30
openssl
security
vulnerabilities
dh check
generation
poly1305 mac
vector registers
invalid rsa keys
pkcs12 decoding
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.3%

The updated packages fix security vulnerabilities: Excessive time spent in DH check / generation with large Q parameter value. (CVE-2023-5678) POLY1305 MAC implementation corrupts vector registers on PowerPC. (CVE-2023-6129) Excessive time spent checking invalid RSA public keys. (CVE-2023-6237) PKCS12 Decoding crashes. (CVE-2024-0727)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchopenssl< 3.0.12-1.1openssl-3.0.12-1.1.mga9

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.3%