Mageia 2019-0106: openssl security update
Summary
If an application encounters a fatal protocol error and then calls
SSL_shutdown() twice (once to send a close_notify, and once to receive one)
then OpenSSL can respond differently to the calling application if a 0 byte
record is received with invalid padding compared to if a 0 byte record is
received with an invalid MAC. If the application then behaves differently
based on that in a way that is detectable to the remote peer, then this
amounts to a padding oracle that could be used to decrypt data
(CVE-2019-1559).
References
- https://bugs.mageia.org/show_bug.cgi?id=24434
- https://www.openssl.org/news/secadv/20190226.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559
Resolution
MGASA-2019-0106 - Updated openssl packages fix security vulnerability
SRPMS
- 6/core/openssl-1.0.2r-1.mga6