Mageia 2024-0020: openssl security update
Summary
The updated packages fix security vulnerabilities:
Excessive time spent in DH check / generation with large Q parameter
value. (CVE-2023-5678)
POLY1305 MAC implementation corrupts vector registers on PowerPC.
(CVE-2023-6129)
Excessive time spent checking invalid RSA public keys. (CVE-2023-6237)
PKCS12 Decoding crashes. (CVE-2024-0727)
References
- https://bugs.mageia.org/show_bug.cgi?id=32498
- https://openssl-library.org/news/secadv/20231106.txt
- https://openssl-library.org/news/secadv/20240109.txt
- https://openssl-library.org/news/secadv/20240115.txt
- https://openssl-library.org/news/secadv/20240125.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727
Resolution
MGASA-2024-0020 - Updated openssl packages fix security vulnerabilities
SRPMS
- 9/core/openssl-3.0.12-1.1.mga9