[3.6] openssl: Multiple vulnerabilities (CVE-2017-3735, CVE-2017-3736)
CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read
If an X.509 certificate has a malformed IPAddressFamily extension,
OpenSSL could do a one-byte buffer overread. The most likely result
would be an erroneous display of the certificate in text format.
Fixed In Version:
openssl 1.0.2m, openssl 1.1.0g
References:
https://www.openssl.org/news/secadv/20170828.txt
CVE-2017-3736: bn_sqrx8x_internal carry bug on x86_64
There is a carry propagating bug in the x86_64 Montgomery squaring
procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA
and DSA
as a result of this defect would be very difficult to perform and are
not
believed likely. Attacks against DH are considered just feasible
(although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the
target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients.
This only affects processors that support the BMI1, BMI2 and ADX
extensions like
Intel Broadwell (5th generation) and later or AMD Ryzen.
Fixed In Version:
openssl 1.0.2m, openssl 1.1.0g
References:
https://www.openssl.org/news/secadv/20171102.txt
(from redmine: issue id 8114, created on 2017-11-07, closed on 2017-11-09)
- Relations:
- parent #8113 (closed)
- Changesets:
- Revision 6289c847 by Andy Postnikov on 2017-11-09T07:27:08Z:
main/openssl: security upgrade to 1.0.2m
CVE-2017-3735
CVE-2017-3736
fixes #8114
(cherry picked from commit c57b41c34309ede6b832e2edc306f6ab14a5d78c)