Mageia 2019-0354: openssl security update
Summary
The updated packages fix security vulnerabilities:
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input
for every encryption operation. RFC 7539 specifies that the nonce value
(IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length
and front pads the nonce with 0 bytes if it is less than 12 bytes. However
it also incorrectly allows a nonce to be set of up to 16 bytes. In this
case only the last 12 bytes are significant and any additional leading
bytes are ignored. It is a requirement of using this cipher that nonce
values are unique. Messages encrypted using a reused nonce value are
susceptible to serious confidentiality and integrity attacks. If an
application changes the default nonce length to be longer than 12 bytes
and then makes a change to the leading bytes of the nonce expecting the
new value to be a new unique nonce then such an application could
inadvertently encrypt messages with a reused nonce. Additionally the
ignored bytes in a long ...
References
- https://bugs.mageia.org/show_bug.cgi?id=24888
- https://openssl-library.org/news/secadv/20190306.txt
- https://www.debian.org/security/2019/dsa-4475
- https://openssl-library.org/news/secadv/20190910.txt
- https://www.debian.org/security/2019/dsa-4540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
Resolution
MGASA-2019-0354 - Updated openssl packages fix security vulnerabilities
SRPMS
- 7/core/openssl-1.1.0l-1.mga7
- 7/core/compat-openssl10-1.0.2t-1.mga7