ArchLinux: 201507-12: lib32-openssl: man-in-the-middle
Summary
During certificate verification, OpenSSL will attempt to find an
alternative certificate chain if the first attempt to build such a chain
fails. An error in the implementation of this logic can mean that an
attacker could cause certain checks on untrusted certificates to be
bypassed, such as the CA flag, enabling them to use a valid leaf
certificate to act as a CA and "issue" an invalid certificate.
This issue will impact any application that verifies certificates
including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client
authentication.
Resolution
Upgrade to 1.0.2.d-1.
# pacman -Syu "lib32-openssl>=1.0.2.d-1"
The problem has been fixed upstream in version 1.0.2.d.
References
https://access.redhat.com/security/cve/CVE-2015-1793
Workaround
None.