Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 642
    • Issues 642
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 195
    • Merge Requests 195
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #1152

Closed
Open
Opened May 14, 2012 by Natanael Copa@ncopaOwner

[v2.3] openssl<1.0.0j: Invalid TLS/DTLS record attack (CVE-2012-2333)

OpenSSL Security Advisory [10 May 2012]

Invalid TLS/DTLS record attack (CVE-2012-2333)

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References

URL for this Security Advisory:
http://www.openssl.org/news/secadv\_20120510.txt

(from redmine: issue id 1152, created on 2012-05-14, closed on 2012-05-17)

  • Changesets:
    • Revision 8d888cd6 by Natanael Copa on 2012-05-14T12:49:20Z:
main/openssl: security upgrade to 1.0.0j (CVE-2012-2333)

fixes #1152
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
Alpine 2.3.7
Milestone
Alpine 2.3.7 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#1152